-
1
-
-
84984994815
-
Predicting mobile social network acceptance based on mobile value and social influence
-
Lin K-Y, Lu H-P (2015) Predicting mobile social network acceptance based on mobile value and social influence. Internet Res 25(1):107–130
-
(2015)
Internet Res
, vol.25
, Issue.1
, pp. 107-130
-
-
Lin, K.-Y.1
Lu, H.-P.2
Jansen, J.3
-
2
-
-
84900875339
-
Why do people play mobile social games? An examination of network externalities and of uses and gratifications
-
Wei P-S, Lu H-P (2014) Why do people play mobile social games? An examination of network externalities and of uses and gratifications. Internet Res 24(3):313–331
-
(2014)
Internet Res
, vol.24
, Issue.3
, pp. 313-331
-
-
Wei, P.-S.1
Lu, H.-P.2
-
3
-
-
84943646932
-
All your location are belong to us: Breaking mobile social networks for automated user location tracking
-
Li M, Zhu H, Gao Z, Chen S, Yu L, Hu S, Ren K (2014) All your location are belong to us: Breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing. ACM, pp 43–52
-
(2014)
In: Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing. ACM
, pp. 43-52
-
-
Li, M.1
Zhu, H.2
Gao, Z.3
Chen, S.4
Yu, L.5
Hu, S.6
Ren, K.7
-
4
-
-
84891775418
-
Enabling trustworthy service evaluation in service-oriented mobile social networks
-
Liang X, Lin X, Shen XS (2014) Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Trans Parallel Distrib Syst 25(2):310–320
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.2
, pp. 310-320
-
-
Liang, X.1
Lin, X.2
Shen, X.S.3
-
5
-
-
84902288800
-
Opportunistic routing in intermittently connected mobile p2p networks
-
Wang S, Liu M, Cheng X, Li Z, Huang J, Chen B (2013) Opportunistic routing in intermittently connected mobile p2p networks. IEEE J Sel Areas Commun 31(9):369–378
-
(2013)
IEEE J Sel Areas Commun
, vol.31
, Issue.9
, pp. 369-378
-
-
Wang, S.1
Liu, M.2
Cheng, X.3
Li, Z.4
Huang, J.5
Chen, B.6
-
7
-
-
24944591431
-
-
LaMarca A, Chawathe Y, Consolvo S, Hightower J, Smith I, Scott J, Sohn T, Howard J, Hughes J, Potter F et al (2005) . Springer, pp 116–133
-
LaMarca A, Chawathe Y, Consolvo S, Hightower J, Smith I, Scott J, Sohn T, Howard J, Hughes J, Potter F et al (2005) Place lab: device positioning using radio beacons in the wild. In: Gellerson H-W, Want R, Schmidt A (eds) Pervasive computing. Springer, pp 116–133
-
(2005)
Place lab: device positioning using radio beacons in the wild. In: Gellerson H-W, Want R, Schmidt A (eds) Pervasive computing
, pp. 116-133
-
-
-
8
-
-
84907784448
-
The tempo-spatial information dissemination properties of mobile opportunistic networks with lévy mobility
-
Wang S, Wang X, Cheng X, Huang J, Bie R (2014) The tempo-spatial information dissemination properties of mobile opportunistic networks with lévy mobility. In: Distributed computing systems (ICDCS), 2014 IEEE 34th international conference on. IEEE, pp 124–133
-
(2014)
In: Distributed computing systems (ICDCS), 2014 IEEE 34th international conference on. IEEE
, pp. 124-133
-
-
Wang, S.1
Wang, X.2
Cheng, X.3
Huang, J.4
Bie, R.5
-
11
-
-
84896447687
-
Security and privacy in mobile social networks: challenges and solutions
-
Liang X, Zhang K, Shen X, Lin X (2014) Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel Commun 21(1):33–41
-
(2014)
IEEE Wirel Commun
, vol.21
, Issue.1
, pp. 33-41
-
-
Liang, X.1
Zhang, K.2
Shen, X.3
Lin, X.4
-
12
-
-
84896982446
-
Exploiting multimedia services in mobile social networks from security and privacy perspectives
-
Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65
-
(2014)
IEEE Commun Mag
, vol.52
, Issue.3
, pp. 58-65
-
-
Zhang, K.1
Liang, X.2
Shen, X.3
Lu, R.4
-
14
-
-
84942382661
-
-
Loopt, Inc. your social compass–loopt
-
Loopt, Inc. your social compass–loopt. http://www.loopt.com
-
-
-
-
15
-
-
84942382662
-
-
Google Mobile Latitude
-
Google Mobile Latitude. http://www.google.com/latitude/
-
-
-
-
17
-
-
85018147929
-
Teen hack suspects charged over facebook clone extortion bid
-
Leyden J (2006) Teen hack suspects charged over facebook clone extortion bid. The Register, pp 05–25
-
(2006)
The Register
, pp. 05-25
-
-
Leyden, J.1
-
20
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733
-
(2007)
IEEE Trans Knowl Data Eng
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
21
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: architecture and algorithms
-
Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18
-
(2008)
IEEE Trans Mob Comput
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
23
-
-
27944454864
-
Location privacy in mobile systems: a personalized anonymization model. In: Distributed computing systems, 2005. ICDCS 2005
-
Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: Distributed computing systems, 2005. ICDCS 2005. Proceedings of 25th IEEE international conference on. IEEE, pp 620–629
-
(2005)
Proceedings of 25th IEEE international conference on. IEEE
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
27
-
-
70449638421
-
Robust location tag generation from noisy location data for security applications
-
The institute of navigation international technical meeting, Citeseer
-
Qiu D, Boneh D, Lo S, Enge P (2009) Robust location tag generation from noisy location data for security applications. In: The institute of navigation international technical meeting. Citeseer
-
(2009)
In
-
-
Qiu, D.1
Boneh, D.2
Lo, S.3
Enge, P.4
-
29
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742
-
(1993)
IEEE Trans Inf Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
30
-
-
0027629488
-
Common randomness in information theory and cryptography. Part I. Secret sharing
-
Ahlswede R, Csiszar I (1993) Common randomness in information theory and cryptography. Part I. Secret sharing. IEEE Trans Inf Theory 39(4):1121–1132
-
(1993)
IEEE Trans Inf Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
33
-
-
57349141867
-
Improving wireless privacy with an identifier-free link layer protocol
-
Greenstein B, McCoy D, Pang J, Kohno T, Seshan S, Wetherall D (2008) Improving wireless privacy with an identifier-free link layer protocol. In: Proceedings of the 6th international conference on mobile systems, applications, and services. ACM, pp 40–53
-
(2008)
In: Proceedings of the 6th international conference on mobile systems, applications, and services. ACM
, pp. 40-53
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
34
-
-
60149097098
-
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
-
Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM international conference on mobile computing and networking. ACM, pp 128–139
-
(2008)
In: Proceedings of the 14th ACM international conference on mobile computing and networking. ACM
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
36
-
-
0026762153
-
A universal statistical test for random bit generators
-
Maurer UM (1992) A universal statistical test for random bit generators. J cryptol 5(2):89–105
-
(1992)
J cryptol
, vol.5
, Issue.2
, pp. 89-105
-
-
Maurer, U.M.1
|