메뉴 건너뛰기




Volumn 14, Issue 9, 2015, Pages 1888-1902

Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks

Author keywords

Decentralized Mobile Social Networks; Privacy Preserving Profile Matching; Secure Communication

Indexed keywords

BOTTLES; COMMUNICATION CHANNELS (INFORMATION THEORY); SECURE COMMUNICATION; SMARTPHONES; SOCIAL NETWORKING (ONLINE);

EID: 84939180271     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2014.2366773     Document Type: Article
Times cited : (53)

References (36)
  • 1
    • 84939207682 scopus 로고    scopus 로고
    • Magnetu [Online]
    • Magnetu [Online]. Available: http://magnetu.com, 2013.
    • (2013)
  • 2
    • 84939155847 scopus 로고    scopus 로고
    • Tencent weibo [Online]
    • Tencent weibo [Online]. Available: http://t.qq.com/, 2013.
    • (2013)
  • 4
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • M. Chase, "Multi-authority attribute based encryption, " in Proc. 4th Conf. Theory Cryptography, 2007, pp. 515-534.
    • (2007) Proc. 4th Conf. Theory Cryptography , pp. 515-534
    • Chase, M.1
  • 6
    • 79960871684 scopus 로고    scopus 로고
    • Secure friend discovery in mobile social networks
    • W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 1647-1655.
    • (2011) Proc. IEEE INFOCOM , pp. 1647-1655
    • Dong, W.1    Dave, V.2    Qiu, L.3    Zhang, Y.4
  • 10
    • 84948451182 scopus 로고    scopus 로고
    • A secure protocol for computing dot-products in clustered and distributed environments
    • I. Ioannidis, A. Grama, and M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments, " in Proc. IEEE Int. Conf. Parallel Process., 2002, p. 379.
    • (2002) Proc. IEEE Int. Conf. Parallel Process. , pp. 379
    • Ioannidis, I.1    Grama, A.2    Atallah, M.3
  • 11
    • 84883089676 scopus 로고    scopus 로고
    • Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
    • T. Jung, X. Mao, X.-Y. Li, S. Tang, W. Gong, and L. Zhang, "Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation, " in Proc. IEEE INFOCOM, 2013, pp. 2634-2642.
    • (2013) Proc. IEEE INFOCOM , pp. 2634-2642
    • Jung, T.1    Mao, X.2    Li, X.-Y.3    Tang, S.4    Gong, W.5    Zhang, L.6
  • 12
    • 84919829652 scopus 로고    scopus 로고
    • Control cloud data access privilege and anonymity with fully anonymous attribute based encryption
    • T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Control cloud data access privilege and anonymity with fully anonymous attribute based encryption, " IEEE Trans. Inf. Forensics Security, 2015.
    • (2015) IEEE Trans. Inf. Forensics Security
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3    Wan, M.4
  • 13
    • 84927654398 scopus 로고    scopus 로고
    • Collusion-tolerable privacy-preserving sum and product calculation without secure channel
    • T. Jung and X.-Y. Li, "Collusion-tolerable privacy-preserving sum and product calculation without secure channel, " IEEE Trans. Dependable Secure Comput., 2014.
    • (2014) IEEE Trans. Dependable Secure Comput.
    • Jung, T.1    Li, X.-Y.2
  • 14
    • 84883112893 scopus 로고    scopus 로고
    • Privacy preserving cloud data access with multi-authorities
    • T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-authorities, " in Proc. IEEE INFOCOM, 2013, pp. 2625-2633.
    • (2013) Proc. IEEE INFOCOM , pp. 2625-2633
    • Jung, T.1    Li, X.-Y.2    Wan, Z.3    Wan, M.4
  • 16
    • 79960878565 scopus 로고    scopus 로고
    • FindU: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 2435-2443.
    • (2011) Proc. IEEE INFOCOM , pp. 2435-2443
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4
  • 17
    • 84883115549 scopus 로고    scopus 로고
    • Search me if you can: Privacy-preserving location query service
    • X.-Y. Li and T. Jung, "Search me if you can: Privacy-preserving location query service, " in Proc. IEEE INFOCOM, 2013, pp. 2760-2768.
    • (2013) Proc. IEEE INFOCOM , pp. 2760-2768
    • Li, X.-Y.1    Jung, T.2
  • 18
    • 84879157826 scopus 로고    scopus 로고
    • Privacy vulnerability of published anonymous mobility traces
    • Jun
    • C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao, "Privacy vulnerability of published anonymous mobility traces, " IEEE/ACM Trans. Netw., vol. 21, no. 3, pp. 720-733, Jun. 2013.
    • (2013) IEEE/ACM Trans. Netw. , vol.21 , Issue.3 , pp. 720-733
    • Ma, C.Y.1    Yau, D.K.2    Yip, N.K.3    Rao, N.S.4
  • 23
    • 78651281054 scopus 로고    scopus 로고
    • Enabling social networking in ad hoc networks of mobile phones
    • E. Sarigol, O. Riva, P. Stuedi, and G. Alonso, "Enabling social networking in ad hoc networks of mobile phones, " Proc. VLDB Endowment, vol. 2, pp. 1634-1637, 2009.
    • (2009) Proc. VLDB Endowment , vol.2 , pp. 1634-1637
    • Sarigol, E.1    Riva, O.2    Stuedi, P.3    Alonso, G.4
  • 25
    • 0036999904 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ubiquitous computing
    • Apr
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ubiquitous computing, " IEEE Comput., vol. 35, no. 4, pp. 22-26, Apr. 2002.
    • (2002) IEEE Comput. , vol.35 , Issue.4 , pp. 22-26
    • Stajano, F.1    Anderson, R.2
  • 26
    • 79960856007 scopus 로고    scopus 로고
    • Relationship classification in large scale online social networks and its impact on information
    • S.-J. Tang, J. Yuan, X. Mao, X.-Y. Li, W. Chen, and G. Dai, "Relationship classification in large scale online social networks and its impact on information, " in Proc. IEEE INFOCOM, 2011, pp. 2291-2299.
    • (2011) Proc. IEEE INFOCOM , pp. 2291-2299
    • Tang, S.-J.1    Yuan, J.2    Mao, X.3    Li, X.-Y.4    Chen, W.5    Dai, G.6
  • 29
    • 77954845334 scopus 로고    scopus 로고
    • Privacy and security for online social networks: Challenges and opportunities
    • Jul./Aug
    • C. Zhang, J. Sun, X. Zhu, and Y. Fang, "Privacy and security for online social networks: Challenges and opportunities, " IEEE Netw., vol. 24, no. 4, pp. 13-18, Jul./Aug. 2010.
    • (2010) IEEE Netw. , vol.24 , Issue.4 , pp. 13-18
    • Zhang, C.1    Sun, J.2    Zhu, X.3    Fang, Y.4
  • 34
    • 84883129081 scopus 로고    scopus 로고
    • Verifiable private multiparty computation: Ranging and ranking
    • L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "Verifiable private multiparty computation: Ranging and ranking, " in Proc. IEEE INFO-COM, 2013.
    • (2013) Proc. IEEE INFO-COM
    • Zhang, L.1    Li, X.-Y.2    Liu, Y.3    Jung, T.4
  • 35
    • 84861649075 scopus 로고    scopus 로고
    • Fine-grained private matching for proximity-based mobile social networking
    • R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. IEEE INFOCOM, 2012, pp. 1969-1977.
    • (2012) Proc. IEEE INFOCOM , pp. 1969-1977
    • Zhang, R.1    Zhang, Y.2    Sun, J.3    Yan, G.4
  • 36
    • 84865612170 scopus 로고    scopus 로고
    • Sharp: Private proximity test and secure handshake with cheat-proof location tags
    • Y. Zheng, M. Li, W. Lou, and Y. T. Hou, "Sharp: Private proximity test and secure handshake with cheat-proof location tags, " in Proc. Eur. Symp. Res. Comput. Security, 2012, pp. 361-378.
    • (2012) Proc. Eur. Symp. Res. Comput. Security , pp. 361-378
    • Zheng, Y.1    Li, M.2    Lou, W.3    Hou, Y.T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.