메뉴 건너뛰기




Volumn 19, Issue 7, 2015, Pages 999-1009

Secure friend discovery based on encounter history in mobile social networks

Author keywords

Encounter; Location privacy; Mobile social networks; Secure friend discovery

Indexed keywords

DATA PRIVACY; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; ONLINE SYSTEMS;

EID: 84942373212     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-015-0873-9     Document Type: Article
Times cited : (7)

References (36)
  • 1
    • 84984994815 scopus 로고    scopus 로고
    • Predicting mobile social network acceptance based on mobile value and social influence
    • Lin K-Y, Lu H-P (2015) Predicting mobile social network acceptance based on mobile value and social influence. Internet Res 25(1):107–130
    • (2015) Internet Res , vol.25 , Issue.1 , pp. 107-130
    • Lin, K.-Y.1    Lu, H.-P.2    Jansen, J.3
  • 2
    • 84900875339 scopus 로고    scopus 로고
    • Why do people play mobile social games? An examination of network externalities and of uses and gratifications
    • Wei P-S, Lu H-P (2014) Why do people play mobile social games? An examination of network externalities and of uses and gratifications. Internet Res 24(3):313–331
    • (2014) Internet Res , vol.24 , Issue.3 , pp. 313-331
    • Wei, P.-S.1    Lu, H.-P.2
  • 4
    • 84891775418 scopus 로고    scopus 로고
    • Enabling trustworthy service evaluation in service-oriented mobile social networks
    • Liang X, Lin X, Shen XS (2014) Enabling trustworthy service evaluation in service-oriented mobile social networks. IEEE Trans Parallel Distrib Syst 25(2):310–320
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , Issue.2 , pp. 310-320
    • Liang, X.1    Lin, X.2    Shen, X.S.3
  • 5
    • 84902288800 scopus 로고    scopus 로고
    • Opportunistic routing in intermittently connected mobile p2p networks
    • Wang S, Liu M, Cheng X, Li Z, Huang J, Chen B (2013) Opportunistic routing in intermittently connected mobile p2p networks. IEEE J Sel Areas Commun 31(9):369–378
    • (2013) IEEE J Sel Areas Commun , vol.31 , Issue.9 , pp. 369-378
    • Wang, S.1    Liu, M.2    Cheng, X.3    Li, Z.4    Huang, J.5    Chen, B.6
  • 11
    • 84896447687 scopus 로고    scopus 로고
    • Security and privacy in mobile social networks: challenges and solutions
    • Liang X, Zhang K, Shen X, Lin X (2014) Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel Commun 21(1):33–41
    • (2014) IEEE Wirel Commun , vol.21 , Issue.1 , pp. 33-41
    • Liang, X.1    Zhang, K.2    Shen, X.3    Lin, X.4
  • 12
    • 84896982446 scopus 로고    scopus 로고
    • Exploiting multimedia services in mobile social networks from security and privacy perspectives
    • Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65
    • (2014) IEEE Commun Mag , vol.52 , Issue.3 , pp. 58-65
    • Zhang, K.1    Liang, X.2    Shen, X.3    Lu, R.4
  • 14
    • 84942382661 scopus 로고    scopus 로고
    • Loopt, Inc. your social compass–loopt
    • Loopt, Inc. your social compass–loopt. http://www.loopt.com
  • 15
    • 84942382662 scopus 로고    scopus 로고
    • Google Mobile Latitude
    • Google Mobile Latitude. http://www.google.com/latitude/
  • 16
    • 43549104341 scopus 로고    scopus 로고
    • Facebook retreats on online tracking
    • Story L, Stone B (2007) Facebook retreats on online tracking. The New York Times 30
    • (2007) The New York Times , pp. 30
    • Story, L.1    Stone, B.2
  • 17
    • 85018147929 scopus 로고    scopus 로고
    • Teen hack suspects charged over facebook clone extortion bid
    • Leyden J (2006) Teen hack suspects charged over facebook clone extortion bid. The Register, pp 05–25
    • (2006) The Register , pp. 05-25
    • Leyden, J.1
  • 20
    • 35648982949 scopus 로고    scopus 로고
    • Preventing location-based identity inference in anonymous spatial queries
    • Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733
    • (2007) IEEE Trans Knowl Data Eng , vol.19 , Issue.12 , pp. 1719-1733
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 21
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: architecture and algorithms
    • Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18
    • (2008) IEEE Trans Mob Comput , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 23
    • 27944454864 scopus 로고    scopus 로고
    • Location privacy in mobile systems: a personalized anonymization model. In: Distributed computing systems, 2005. ICDCS 2005
    • Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: Distributed computing systems, 2005. ICDCS 2005. Proceedings of 25th IEEE international conference on. IEEE, pp 620–629
    • (2005) Proceedings of 25th IEEE international conference on. IEEE , pp. 620-629
    • Gedik, B.1    Liu, L.2
  • 27
    • 70449638421 scopus 로고    scopus 로고
    • Robust location tag generation from noisy location data for security applications
    • The institute of navigation international technical meeting, Citeseer
    • Qiu D, Boneh D, Lo S, Enge P (2009) Robust location tag generation from noisy location data for security applications. In: The institute of navigation international technical meeting. Citeseer
    • (2009) In
    • Qiu, D.1    Boneh, D.2    Lo, S.3    Enge, P.4
  • 29
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742
    • (1993) IEEE Trans Inf Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 30
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. Part I. Secret sharing
    • Ahlswede R, Csiszar I (1993) Common randomness in information theory and cryptography. Part I. Secret sharing. IEEE Trans Inf Theory 39(4):1121–1132
    • (1993) IEEE Trans Inf Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 36
    • 0026762153 scopus 로고
    • A universal statistical test for random bit generators
    • Maurer UM (1992) A universal statistical test for random bit generators. J cryptol 5(2):89–105
    • (1992) J cryptol , vol.5 , Issue.2 , pp. 89-105
    • Maurer, U.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.