-
1
-
-
84921898213
-
Privacy and human behavior in the age of information
-
A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information, " Science, vol. 347, no. 6221, pp. 509-514, 2015.
-
(2015)
Science
, vol.347
, Issue.6221
, pp. 509-514
-
-
Acquisti, A.1
Brandimarte, L.2
Loewenstein, G.3
-
2
-
-
84960984968
-
-
Jul. [Online]. Available
-
D. Lewis. (Jul. 2015). iCloud Data Breach: Hacking and Celebrity Photos. [Online]. Available: http://www.forbes.com/sites/davelewis/2014/09/02/icloud-data-breach-hacking-And-nude-celebrity-photos/
-
(2015)
ICloud Data Breach: Hacking and Celebrity Photos
-
-
Lewis, D.1
-
3
-
-
84869465300
-
Protecting location privacy: Optimal strategy against localization attacks
-
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec, "Protecting location privacy: Optimal strategy against localization attacks, " in Proc. ACM Conf. Comput. Commun. Secur., Raleigh, NC, USA, 2012, pp. 617-627.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur., Raleigh, NC, USA
, pp. 617-627
-
-
Shokri, R.1
Theodorakopoulos, G.2
Troncoso, C.3
Hubaux, J.-P.4
Le Boudec, J.-Y.5
-
4
-
-
79960878565
-
FindU: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks, " in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 2435-2443.
-
(2011)
Proc. IEEE INFOCOM, Shanghai, China
, pp. 2435-2443
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
5
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks, " in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 1647-1655.
-
(2011)
Proc. IEEE INFOCOM, Shanghai, China
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
6
-
-
84953364314
-
NetSecCC: A scalable and fault-Tolerant architecture for cloud computing security
-
J. He, M. Dong, K. Ota, M. Fan, and G. Wang, "NetSecCC: A scalable and fault-Tolerant architecture for cloud computing security, " Peer-To-Peer Netw. Appl., vol. 9, no. 1, pp. 67-81, 2016.
-
(2016)
Peer-To-Peer Netw. Appl.
, vol.9
, Issue.1
, pp. 67-81
-
-
He, J.1
Dong, M.2
Ota, K.3
Fan, M.4
Wang, G.5
-
7
-
-
84925082806
-
Multicloud-based evacuation services for emergency management
-
Nov.
-
M. Dong, H. Li, K. Ota, L. T. Yang, and H. Zhu, "Multicloud-based evacuation services for emergency management, " IEEE Cloud Comput., vol. 1, no. 4, pp. 50-59, Nov. 2014.
-
(2014)
IEEE Cloud Comput.
, vol.1
, Issue.4
, pp. 50-59
-
-
Dong, M.1
Li, H.2
Ota, K.3
Yang, L.T.4
Zhu, H.5
-
8
-
-
84855674646
-
A secure handshake scheme with symptoms-matching for mHealthcare social network
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mHealthcare social network, " Mobile Netw. Appl., vol. 16, no. 6, pp. 683-694, 2011.
-
(2011)
Mobile Netw. Appl.
, vol.16
, Issue.6
, pp. 683-694
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
9
-
-
56749173469
-
Veneta: Serverless friend-of-friend detection in mobile social networking
-
M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "Veneta: Serverless friend-of-friend detection in mobile social networking, " in Proc. IEEE Int. Conf. Wireless Mobile Comput., Avignon, France, 2008, pp. 184-189.
-
(2008)
Proc. IEEE Int. Conf. Wireless Mobile Comput., Avignon, France
, pp. 184-189
-
-
Von Arb, M.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
-
10
-
-
33745160750
-
Privacy-preserving set operations
-
Heidelberg, Germany: Springer
-
L. Kissner and D. Song, "Privacy-preserving set operations, " in Advances in Cryptology-CRYPTO. Heidelberg, Germany: Springer, 2005, pp. 241-257.
-
(2005)
Advances in Cryptology-CRYPTO
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
11
-
-
41549155611
-
Distributed private matching and set operations
-
Heidelberg, Germany: Springer
-
Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations, " in Information Security Practice and Experience. Heidelberg, Germany: Springer, 2008, pp. 347-360.
-
(2008)
Information Security Practice and Experience
, pp. 347-360
-
-
Ye, Q.1
Wang, H.2
Pieprzyk, J.3
-
12
-
-
35048820609
-
Efficient private matching and set intersection
-
Heidelberg, Germany: Springer
-
M. J. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection, " in Advances in Cryptology-EUROCRYPT. Heidelberg, Germany: Springer, 2004, pp. 1-19.
-
(2004)
Advances in Cryptology-EUROCRYPT
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
13
-
-
77955318017
-
Practical private set intersection protocols with linear complexity
-
Heidelberg, Germany: Springer
-
E. De Cristofaro and G. Tsudik, "Practical private set intersection protocols with linear complexity, " in Financial Cryptography and Data Security. Heidelberg, Germany: Springer, 2010, pp. 143-159.
-
(2010)
Financial Cryptography and Data Security
, pp. 143-159
-
-
De Cristofaro, E.1
Tsudik, G.2
-
14
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining, " in ACM Sigmod Rec., vol. 29, no. 2, pp. 439-450, 2000.
-
(2000)
ACM Sigmod Rec.
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
15
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Heidelberg, Germany: Springer
-
M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption, " in Advances in Cryptology-CRYPTO. Heidelberg, Germany: Springer, 2007, pp. 535-552.
-
(2007)
Advances in Cryptology-CRYPTO
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
16
-
-
51849114183
-
On notions of security for deterministic encryption, and efficient constructions without random oracles
-
Heidelberg, Germany: Springer
-
A. Boldyreva, S. Fehr, and A. O'Neill, "On notions of security for deterministic encryption, and efficient constructions without random oracles, " in Advances in Cryptology-CRYPTO. Heidelberg, Germany: Springer, 2008, pp. 335-359.
-
(2008)
Advances in Cryptology-CRYPTO
, pp. 335-359
-
-
Boldyreva, A.1
Fehr, S.2
O'Neill, A.3
-
17
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data, " in Proc. ACM SIGMOD Int. Conf. Manag. Data, New York, NY, USA, 2004, pp. 563-574.
-
(2004)
Proc. ACM SIGMOD Int. Conf. Manag. Data, New York, NY, USA
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
18
-
-
67650690965
-
Order-preserving symmetric encryption
-
Heidelberg, Germany: Springer
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill, "Order-preserving symmetric encryption, " in Advances in Cryptology-EUROCRYPT. Heidelberg, Germany: Springer, 2009, pp. 224-241.
-
(2009)
Advances in Cryptology-EUROCRYPT
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
19
-
-
85150485002
-
Location privacy via private proximity testing
-
A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh, "Location privacy via private proximity testing, " in Proc. NDSS, San Diego, CA, USA, 2011.
-
(2011)
Proc. NDSS, San Diego, CA, USA
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
20
-
-
84929338540
-
Asymmetric social proximity based private matching protocols for online social networks
-
Jun.
-
A. Thapa, M. Li, S. Salinas, and P. Li, "Asymmetric social proximity based private matching protocols for online social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1547-1559, Jun. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.6
, pp. 1547-1559
-
-
Thapa, A.1
Li, M.2
Salinas, S.3
Li, P.4
-
21
-
-
84865705618
-
HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks
-
X. Liang, M. Barua, R. Lu, X. Lin, and X. S. Shen, "HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks, " Comput. Commun., vol. 35, no. 15, pp. 1910-1920, 2012.
-
(2012)
Comput. Commun.
, vol.35
, Issue.15
, pp. 1910-1920
-
-
Liang, X.1
Barua, M.2
Lu, R.3
Lin, X.4
Shen, X.S.5
-
22
-
-
84861649075
-
Fine-grained private matching for proximity-based mobile social networking
-
R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. IEEE INFOCOM, Orlando, FL, USA, 2012, pp. 1969-1977.
-
(2012)
Proc. IEEE INFOCOM, Orlando, FL, USA
, pp. 1969-1977
-
-
Zhang, R.1
Zhang, Y.2
Sun, J.3
Yan, G.4
-
23
-
-
84883385828
-
Privacy-preserving profile matching for proximity-based mobile social networking
-
Sep.
-
R. Zhang, J. Zhang, Y. Zhang, J. Sun, and G. Yan, "Privacy-preserving profile matching for proximity-based mobile social networking, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 656-668, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 656-668
-
-
Zhang, R.1
Zhang, J.2
Zhang, Y.3
Sun, J.4
Yan, G.5
-
24
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
Feb.
-
C.Wang, S. S. Chow, Q.Wang, K. Ren, andW. Lou, "Privacy-preserving public auditing for secure cloud storage, " IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
25
-
-
84883068326
-
Privacy-preserving spatiotemporal matching
-
J. Sun, R. Zhang, and Y. Zhang, "Privacy-preserving spatiotemporal matching, " in Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 800-808.
-
(2013)
Proc. IEEE INFOCOM, Turin, Italy
, pp. 800-808
-
-
Sun, J.1
Zhang, R.2
Zhang, Y.3
-
26
-
-
84883089676
-
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
-
T. Jung, et al., "Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation, " in Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 2634-2642.
-
(2013)
Proc. IEEE INFOCOM, Turin, Italy
, pp. 2634-2642
-
-
Jung, T.1
-
27
-
-
85010059588
-
Privacy-preserving spatiotemporal matching for secure device-To-device communications
-
to be published
-
J. Sun, R. Zhang, and Y. Zhang, "Privacy-preserving spatiotemporal matching for secure device-To-device communications, " IEEE Internet Things J., to be published.
-
IEEE Internet Things J.
-
-
Sun, J.1
Zhang, R.2
Zhang, Y.3
|