메뉴 건너뛰기




Volumn 9, Issue 3, 2015, Pages 834-854

Safety challenges and solutions in mobile social networks

Author keywords

Mobile social networks (MSNs); opportunistic communications; privacy; security; trust

Indexed keywords


EID: 85028227003     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2013.2284696     Document Type: Article
Times cited : (31)

References (98)
  • 1
    • 81855199790 scopus 로고    scopus 로고
    • Applications, architectures, and protocol design issues for mobile social networks: A survey
    • Dec.
    • N. Kayastha, D. Niyato, P. Wang, and E. Hossain, "Applications, architectures, and protocol design issues for mobile social networks: A survey, " Proc. IEEE, vol. 99, no. 12, pp. 2130-2158, Dec. 2011.
    • (2011) Proc. IEEE , vol.99 , Issue.12 , pp. 2130-2158
    • Kayastha, N.1    Niyato, D.2    Wang, P.3    Hossain, E.4
  • 2
    • 84881315820 scopus 로고    scopus 로고
    • Mobile social networks: Architectures, social properties and key research challenges
    • 3rd Qtr.
    • N. Vastardis and K. Yang, "Mobile social networks: Architectures, social properties and key research challenges, " IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 1355-1371, 3rd Qtr., 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.3 , pp. 1355-1371
    • Vastardis, N.1    Yang, K.2
  • 3
    • 33947176178 scopus 로고    scopus 로고
    • Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks
    • Nov.
    • L. Pelusi, A. Passarella, and M. Conti, "Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks, " IEEE Commun. Mag., vol. 44, no. 11, pp. 134-141, Nov. 2006.
    • (2006) IEEE Commun. Mag. , vol.44 , Issue.11 , pp. 134-141
    • Pelusi, L.1    Passarella, A.2    Conti, M.3
  • 4
    • 1242310099 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged Internets
    • K. Fall, "A delay-tolerant network architecture for challenged Internets, " in Proc. SIGCOMM, 2003, pp. 27-34.
    • (2003) Proc. SIGCOMM , pp. 27-34
    • Fall, K.1
  • 5
    • 84860886202 scopus 로고    scopus 로고
    • Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges
    • 2nd Qtr.
    • M. Khabbaz, C. M. Assi, and W. Fawaz, "Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges, " IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 607-640, 2nd Qtr. 2012.
    • (2012) IEEE Commun. Surveys Tuts. , vol.14 , Issue.2 , pp. 607-640
    • Khabbaz, M.1    Assi, C.M.2    Fawaz, W.3
  • 6
    • 72949107570 scopus 로고    scopus 로고
    • The concept of opportunistic networks and their research challenges in privacy and security
    • S. K. Makki, P. Reiher, K. Makki, N. Pissinou, and S. Makki, Eds. New York, NY, USA: Springer-Verlag
    • L. Lilien, Z. Kamal, V. Bhuse, and A. Gupta, "The concept of opportunistic networks and their research challenges in privacy and security, " in Mobile and Wireless Network Security and Privacy, S. K. Makki, P. Reiher, K. Makki, N. Pissinou, and S. Makki, Eds. New York, NY, USA: Springer-Verlag, 2007, pp. 85-117.
    • (2007) Mobile and Wireless Network Security and Privacy , pp. 85-117
    • Lilien, L.1    Kamal, Z.2    Bhuse, V.3    Gupta, A.4
  • 7
    • 66549119801 scopus 로고    scopus 로고
    • Opportunistic sensing: Security challenges for the new paradigm
    • A. Kapadia, D. Kotz, and N. Triandopoulos, "Opportunistic sensing: Security challenges for the new paradigm, " in Proc. COMSNETS, 2009, pp. 127-136.
    • (2009) Proc. COMSNETS , pp. 127-136
    • Kapadia, A.1    Kotz, D.2    Triandopoulos, N.3
  • 8
    • 79958001385 scopus 로고    scopus 로고
    • Security challenges in opportunistic communication
    • A. Shikfa, "Security challenges in opportunistic communication, " in Proc. IEEE Conf. Exhib. GCC, 2011, pp. 425-428.
    • (2011) Proc. IEEE Conf. Exhib. GCC , pp. 425-428
    • Shikfa, A.1
  • 9
    • 70849109966 scopus 로고    scopus 로고
    • Solutions to security and privacy issues in mobile social networking
    • A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacy issues in mobile social networking, " in Proc. Int. Conf. CSE, 2009, pp. 1036-1042.
    • (2009) Proc. Int. Conf. CSE , pp. 1036-1042
    • Beach, A.1    Gartrell, M.2    Han, R.3
  • 10
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • J. R. Douceur, "The Sybil attack, " in Proc. 1st IPTPS, 2002, pp. 251-260.
    • (2002) Proc. 1st IPTPS , pp. 251-260
    • Douceur, J.R.1
  • 12
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Jan.-Mar.
    • S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-organized public-key management for mobile ad hoc networks, " IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
    • (2003) IEEE Trans. Mobile Comput. , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 14
    • 33847708791 scopus 로고    scopus 로고
    • Delay-tolerant broadcasting
    • Mar.
    • G. Karlsson, V. Lenders, and M. May, "Delay-tolerant broadcasting, " IEEE Trans. Broadcast., vol. 53, no. 1, pp. 369-381, Mar. 2007.
    • (2007) IEEE Trans. Broadcast. , vol.53 , Issue.1 , pp. 369-381
    • Karlsson, G.1    Lenders, V.2    May, M.3
  • 16
    • 45749109010 scopus 로고    scopus 로고
    • Sybil-Guard: Defending against Sybil attacks via social networks
    • Jun.
    • Y. Haifeng, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "Sybil-Guard: Defending against Sybil attacks via social networks, " IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 576-589, Jun. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.3 , pp. 576-589
    • Haifeng, Y.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 17
    • 77953317298 scopus 로고    scopus 로고
    • Sybil attacks against mobile users: Friends and foes to the rescue
    • D. Quercia and S. Hailes, "Sybil attacks against mobile users: Friends and foes to the rescue, " in Proc. IEEE INFOCOM, 2010, pp. 1-5.
    • (2010) Proc. IEEE INFOCOM , pp. 1-5
    • Quercia, D.1    Hailes, S.2
  • 18
    • 84861603155 scopus 로고    scopus 로고
    • SybilDefender: Defend against sybil attacks in large social networks
    • W. Wei, F. Xu, V. C. Tan, and Q. Li, "SybilDefender: Defend against sybil attacks in large social networks, " in Proc. IEEE INFOCOM, 2012, pp. 1951-1959.
    • (2012) Proc. IEEE INFOCOM , pp. 1951-1959
    • Wei, W.1    Xu, F.2    Tan, V.C.3    Li, Q.4
  • 19
    • 79960871268 scopus 로고    scopus 로고
    • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    • A. Mohaisen, N. Hopper, and K. Yongdae, "Keep your friends close: Incorporating trust into social network-based Sybil defenses, " in Proc. IEEE INFOCOM, 2011, pp. 1943-1951.
    • (2011) Proc. IEEE INFOCOM , pp. 1943-1951
    • Mohaisen, A.1    Hopper, N.2    Yongdae, K.3
  • 20
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • Jan.-Mar.
    • D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses, " IEEE Pervasive Comput., vol. 7, no. 1, pp. 74-81, Jan.-Mar. 2008.
    • (2008) IEEE Pervasive Comput. , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 21
    • 77952910261 scopus 로고    scopus 로고
    • RADON: Reputation-assisted data forwarding in opportunistic networks
    • N. Li and S. K. Das, "RADON: Reputation-assisted data forwarding in opportunistic networks, " in Proc. MobiOpp, 2010, pp. 8-14.
    • (2010) Proc. MobiOpp , pp. 8-14
    • Li, N.1    Das, S.K.2
  • 22
    • 84877583840 scopus 로고    scopus 로고
    • A trust-based framework for data forwarding in opportunistic networks
    • Jun.
    • N. Li and S. K. Das, "A trust-based framework for data forwarding in opportunistic networks, " Ad Hoc Netw., vol. 11, no. 4, pp. 1497-1509, Jun. 2013.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.4 , pp. 1497-1509
    • Li, N.1    Das, S.K.2
  • 26
    • 78249236236 scopus 로고    scopus 로고
    • MobiTrust: Trust management system in mobile social computing
    • L. Juan, Z. Zonghua, and Z. Weiyi, "MobiTrust: Trust management system in mobile social computing, " in Proc. IEEE 10th Int. Conf. CIT, 2010, pp. 954-959.
    • (2010) Proc. IEEE 10th Int. Conf. CIT , pp. 954-959
    • Juan, L.1    Zonghua, Z.2    Weiyi, Z.3
  • 27
    • 84858666726 scopus 로고    scopus 로고
    • Iterative trust and reputation management using belief propagation
    • May/Jun.
    • E. Ayday and F. Fekri, "Iterative trust and reputation management using belief propagation, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 3, pp. 375-386, May/Jun. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput. , vol.9 , Issue.3 , pp. 375-386
    • Ayday, E.1    Fekri, F.2
  • 28
    • 84856255130 scopus 로고    scopus 로고
    • SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems
    • Mar./Apr.
    • A. Das and M. M. Islam, "SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 261-274, Mar./Apr. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput. , vol.9 , Issue.2 , pp. 261-274
    • Das, A.1    Islam, M.M.2
  • 29
    • 84891775418 scopus 로고    scopus 로고
    • Enabling trustworthy service evaluation in service-oriented mobile social networks
    • in press
    • X. Liang, X. Lin, and X. Shen, "Enabling trustworthy service evaluation in service-oriented mobile social networks, " IEEE Trans. Parallel Distrib. Syst., in press, DOI: 10.1109/TPDS.2013.37.
    • IEEE Trans. Parallel Distrib. Syst
    • Liang, X.1    Lin, X.2    Shen, X.3
  • 30
    • 80051768284 scopus 로고    scopus 로고
    • Sustaining cooperation in multi-hop wireless networks
    • R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Sustaining cooperation in multi-hop wireless networks, " in Proc. NSDI, 2005, vol. 2, pp. 231-244.
    • (2005) Proc. NSDI , vol.2 , pp. 231-244
    • Mahajan, R.1    Rodrig, M.2    Wetherall, D.3    Zahorjan, J.4
  • 31
    • 77953317183 scopus 로고    scopus 로고
    • Stimulating cooperation in multi-hop wireless networks using cheating detection system
    • M. E. Mahmoud and S. Xuemin, "Stimulating cooperation in multi-hop wireless networks using cheating detection system, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Mahmoud, M.E.1    Xuemin, S.2
  • 32
    • 84879182183 scopus 로고    scopus 로고
    • SUCCESS: A secure user-centric and social-aware reputation based incentive scheme for DTNs
    • L. Wei, H. Zhu, Z. Cao, and X. Shen, "SUCCESS: A secure user-centric and social-aware reputation based incentive scheme for DTNs, " Ad Hoc Wireless Sensor Netw., vol. 19, no. 1/2, pp. 95-118, 2013.
    • (2013) Ad Hoc Wireless Sensor Netw. , vol.19 , Issue.1-2 , pp. 95-118
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Shen, X.4
  • 33
    • 70350238158 scopus 로고    scopus 로고
    • SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
    • Oct.
    • Z. Haojin, L. Xiaodong, L. Rongxing, F. Yanfei, and S. Xuemin, "SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks, " IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628-4639, Oct. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.8 , pp. 4628-4639
    • Haojin, Z.1    Xiaodong, L.2    Rongxing, L.3    Yanfei, F.4    Xuemin, S.5
  • 34
    • 84861139529 scopus 로고    scopus 로고
    • Give2Get: Forwarding in social mobile wireless networks of selfish individuals
    • Jul./Aug.
    • A. Mei and J. Stefa, "Give2Get: Forwarding in social mobile wireless networks of selfish individuals, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 4, pp. 569-582, Jul./Aug. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput. , vol.9 , Issue.4 , pp. 569-582
    • Mei, A.1    Stefa, J.2
  • 36
    • 77953319755 scopus 로고    scopus 로고
    • Routing in socially selfish delay tolerant networks
    • L. Qinghua, Z. Sencun, and C. Guohong, "Routing in socially selfish delay tolerant networks, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Qinghua, L.1    Sencun, Z.2    Guohong, C.3
  • 37
    • 85028221670 scopus 로고    scopus 로고
    • Internal threats avoiding based forwarding protocol in social selfish delay tolerant networks
    • G. Xin, L. Cong, C. Min, C. Hongyang, and T. Ohtsuki, "Internal threats avoiding based forwarding protocol in social selfish delay tolerant networks, " in Proc. ICC, 2011, pp. 1-6.
    • (2011) Proc. ICC , pp. 1-6
    • Xin, G.1    Cong, L.2    Min, C.3    Hongyang, C.4    Ohtsuki, T.5
  • 38
    • 80052993222 scopus 로고    scopus 로고
    • Social-based trust in mobile opportunistic networks
    • A. Mtibaa and K. A. Harras, "Social-based trust in mobile opportunistic networks, " in Proc. ICCCN, 2011, pp. 1-6.
    • (2011) Proc. ICCCN , pp. 1-6
    • Mtibaa, A.1    Harras, K.A.2
  • 39
    • 67650459766 scopus 로고    scopus 로고
    • Trust and privacy: Informal ways to assess risk on opportunistic exchanges
    • M. R. P. Gonçalves, E. D. S. Moreira, and L. A. F. Martimiano, "Trust and privacy: Informal ways to assess risk on opportunistic exchanges, " Int J. Comput. Sci. Appl., vol. 6, no. 2, pp. 66-85, 2009.
    • (2009) Int J. Comput. Sci. Appl. , vol.6 , Issue.2 , pp. 66-85
    • Gonçalves, M.R.P.1    Moreira, E.D.S.2    Martimiano, L.A.F.3
  • 40
    • 69249223002 scopus 로고    scopus 로고
    • Barter trade improves message delivery in opportunistic networks
    • Jan.
    • L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda, "Barter trade improves message delivery in opportunistic networks, " Ad Hoc Networks, vol. 8, no. 1, pp. 1-14, Jan. 2010.
    • (2010) Ad Hoc Networks , vol.8 , Issue.1 , pp. 1-14
    • Buttyán, L.1    Dóra, L.2    Félegyházi, M.3    Vajda, I.4
  • 41
    • 51649113091 scopus 로고    scopus 로고
    • Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution
    • Oct.
    • C. Boldrini, M. Conti, and A. Passarella, "Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution, " Pervasive Mobile Comput., vol. 4, no. 5, pp. 633-657, Oct. 2008.
    • (2008) Pervasive Mobile Comput. , vol.4 , Issue.5 , pp. 633-657
    • Boldrini, C.1    Conti, M.2    Passarella, A.3
  • 42
    • 74349116503 scopus 로고    scopus 로고
    • Privacy in context-based and epidemic forwarding
    • A. Shikfa, M. Onen, and R. Molva, "Privacy in context-based and epidemic forwarding, " in Proc. IEEE WoWMoM, 2009, pp. 1-7.
    • (2009) Proc. IEEE WoWMoM , pp. 1-7
    • Shikfa, A.1    Onen, M.2    Molva, R.3
  • 44
    • 84855674646 scopus 로고    scopus 로고
    • A secure handshake scheme with symptoms-matching for mHealthcare social network
    • Dec.
    • R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mHealthcare social network, " J. Mobile Netw. Appl., vol. 16, no. 6, pp. 683-694, Dec. 2011.
    • (2011) J. Mobile Netw. Appl. , vol.16 , Issue.6 , pp. 683-694
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 45
    • 85028207004 scopus 로고    scopus 로고
    • An efficient and secure user revocation scheme in mobile social networks
    • L. Xiaohui, L. Xu, L. Rongxing, L. Xiaodong, and S. Xuemin, "An efficient and secure user revocation scheme in mobile social networks, " in Proc. IEEE GLOBECOM, 2011, pp. 1-5.
    • (2011) Proc. IEEE GLOBECOM , pp. 1-5
    • Xiaohui, L.1    Xu, L.2    Rongxing, L.3    Xiaodong, L.4    Xuemin, S.5
  • 46
    • 70449465392 scopus 로고    scopus 로고
    • Dynamic policy based model for trust based access control in P2P applications
    • M. Chatterjee, G. Sivakumar, and B. Menezes, "Dynamic policy based model for trust based access control in P2P applications, " in Proc. IEEE ICC, 2009, pp. 1-5.
    • (2009) Proc. IEEE ICC , pp. 1-5
    • Chatterjee, M.1    Sivakumar, G.2    Menezes, B.3
  • 48
    • 77953313061 scopus 로고    scopus 로고
    • SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
    • L. Rongxing, L. Xiaodong, and S. Xuemin, "SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Rongxing, L.1    Xiaodong, L.2    Xuemin, S.3
  • 49
    • 70449632776 scopus 로고    scopus 로고
    • Leveraging social contacts for message confidentiality in delay tolerant networks
    • K. El Defrawy, J. Solis, and G. Tsudik, "Leveraging social contacts for message confidentiality in delay tolerant networks, " in Proc. IEEE COMPSAC, 2009, pp. 271-279.
    • (2009) Proc. IEEE COMPSAC , pp. 271-279
    • El Defrawy, K.1    Solis, J.2    Tsudik, G.3
  • 50
    • 67650233907 scopus 로고    scopus 로고
    • Hierarchical identity based cryptography for end-to-end security in DTNs
    • R. Patra, S. Surana, and S. Nedevschi, "Hierarchical identity based cryptography for end-to-end security in DTNs, " in Proc. ICCP, 2008, pp. 223-230.
    • (2008) Proc. ICCP , pp. 223-230
    • Patra, R.1    Surana, S.2    Nedevschi, S.3
  • 51
    • 84858017885 scopus 로고    scopus 로고
    • Public key distribution scheme for delay tolerant networks based on two-channel cryptography
    • May
    • Z. Jia, X. Lin, S.-H. Tan, L. Li, and Y. Yang, "Public key distribution scheme for delay tolerant networks based on two-channel cryptography, " J. Netw. Comput. Appl., vol. 35, no. 3, pp. 905-913, May 2012.
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.3 , pp. 905-913
    • Jia, Z.1    Lin, X.2    Tan, S.-H.3    Li, L.4    Yang, Y.5
  • 52
    • 85028223212 scopus 로고    scopus 로고
    • Security in unstructured opportunistic networks: Vague communication and counter intelligence functionality
    • Jan.
    • K. S. Rao, M. Lokeswari, and J. Srikanth, "Security in unstructured opportunistic networks: Vague communication and counter intelligence functionality, " Int. J. Comput. Sci. Telecommun., vol. 3, no. 1, pp. 54-61, Jan. 2012.
    • (2012) Int. J. Comput. Sci. Telecommun. , vol.3 , Issue.1 , pp. 54-61
    • Rao, K.S.1    Lokeswari, M.2    Srikanth, J.3
  • 54
    • 73849129514 scopus 로고    scopus 로고
    • Providing location security in vehicular ad hoc networks
    • Dec.
    • Y. Gongjun, S. Olariu, and M. C. Weigle, "Providing location security in vehicular ad hoc networks, " IEEE Wireless Commun., vol. 16, no. 6, pp. 48-55, Dec. 2009.
    • (2009) IEEE Wireless Commun. , vol.16 , Issue.6 , pp. 48-55
    • Gongjun, Y.1    Olariu, S.2    Weigle, M.C.3
  • 55
    • 80051889537 scopus 로고    scopus 로고
    • Location cheating: A security challenge to location-based social network services
    • H. Wenbo, L. Xue, and R. Mai, "Location cheating: A security challenge to location-based social network services, " in Proc. ICDCS, 2011, pp. 740-749.
    • (2011) Proc. ICDCS , pp. 740-749
    • Wenbo, H.1    Xue, L.2    Mai, R.3
  • 57
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Sep.
    • Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks, " Wireless Netw., vol. 9, no. 5, pp. 545-556, Sep. 2003.
    • (2003) Wireless Netw. , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 58
    • 74849136546 scopus 로고    scopus 로고
    • A framework for intrusion detection systems by social network analysis methods in ad hoc networks
    • Nov./Dec.
    • W. Wang, H. Man, and Y. Liu, "A framework for intrusion detection systems by social network analysis methods in ad hoc networks, " Security Commun. Netw., vol. 2, no. 6, pp. 669-685, Nov./Dec. 2009.
    • (2009) Security Commun. Netw. , vol.2 , Issue.6 , pp. 669-685
    • Wang, W.1    Man, H.2    Liu, Y.3
  • 59
  • 61
    • 70249088359 scopus 로고    scopus 로고
    • NOYB: Privacy in online social networks
    • S. Guha, K. Tang, and P. Francis, "NOYB: Privacy in online social networks, " in Proc. WOSN, 2008, pp. 49-54.
    • (2008) Proc. WOSN , pp. 49-54
    • Guha, S.1    Tang, K.2    Francis, P.3
  • 62
    • 77952919816 scopus 로고    scopus 로고
    • Hide-and-Lie: Enhancing application-level privacy in opportunistic networks
    • L. Dóra and T. Holczer, "Hide-and-Lie: Enhancing application-level privacy in opportunistic networks, " in Proc. MobiOpp, 2010, pp. 135-142.
    • (2010) Proc. MobiOpp , pp. 135-142
    • Dóra, L.1    Holczer, T.2
  • 65
    • 77954016786 scopus 로고    scopus 로고
    • Privacy-enhanced social network routing in opportunistic networks
    • I. Parris, G. Bigwood, and T. Henderson, "Privacy-enhanced social network routing in opportunistic networks, " in Proc. IEEE PERCOM, 2010, pp. 624-629.
    • (2010) Proc. IEEE PERCOM , pp. 624-629
    • Parris, I.1    Bigwood, G.2    Henderson, T.3
  • 67
    • 74049107299 scopus 로고    scopus 로고
    • A performance evaluation framework for fair solutions in ad hoc networks
    • M. Dramitinos, R. Vannier, and I. G. Lassous, "A performance evaluation framework for fair solutions in ad hoc networks, " in Proc. ACM MSWiM, 2009, pp. 46-53.
    • (2009) Proc. ACM MSWiM , pp. 46-53
    • Dramitinos, M.1    Vannier, R.2    Lassous, I.G.3
  • 68
    • 80052792972 scopus 로고    scopus 로고
    • FOG: Fairness in mobile opportunistic networking
    • A. Mtibaa and K. A. Harras, "FOG: Fairness in mobile opportunistic networking, " in Proc. IEEE SECON, 2011, pp. 260-268.
    • (2011) Proc. IEEE SECON , pp. 260-268
    • Mtibaa, A.1    Harras, K.A.2
  • 69
    • 0031682832 scopus 로고    scopus 로고
    • Efficient and practical fair exchange protocols with off-line TTP
    • B. Feng, R. H. Deng, and M. Wenbo, "Efficient and practical fair exchange protocols with off-line TTP, " in Proc. IEEE Symp. Security Privacy, 1998, pp. 77-85.
    • (1998) Proc. IEEE Symp. Security Privacy , pp. 77-85
    • Feng, B.1    Deng, R.H.2    Wenbo, M.3
  • 70
    • 84976804419 scopus 로고
    • How to exchange (secret) keys
    • May
    • M. Blum, "How to exchange (secret) keys, " ACM Trans. Comput. Syst., vol. 1, no. 2, pp. 175-193, May 1983.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , Issue.2 , pp. 175-193
    • Blum, M.1
  • 71
    • 80052161755 scopus 로고    scopus 로고
    • Finegrained identification with real-time fairness in mobile social networks
    • L. Xiaohui, L. Xu, L. Rongxing, L. Xiaodong, and S. Xuemin, "Finegrained identification with real-time fairness in mobile social networks, " in Proc. IEEE ICC, 2011, pp. 1-5.
    • (2011) Proc. IEEE ICC , pp. 1-5
    • Xiaohui, L.1    Xu, L.2    Rongxing, L.3    Xiaodong, L.4    Xuemin, S.5
  • 72
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Berlin, Germany: Springer-Verlag
    • M. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection, " in Advances in Cryptology EUROCRYPT. Berlin, Germany: Springer-Verlag, 2004, pp. 1-19.
    • (2004) Advances in Cryptology EUROCRYPT , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 73
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Berlin, Germany: Springer-Verlag
    • L. Kissner and D. Song, "Privacy-preserving set operations, " in Advances in Cryptology CRYPTO. Berlin, Germany: Springer-Verlag, 2005, pp. 241-257.
    • (2005) Advances in Cryptology CRYPTO , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 74
    • 41549104640 scopus 로고    scopus 로고
    • Efficient protocols for privacy preserving matching against distributed datasets
    • Berlin, Germany: Springer-Verlag
    • Y. Sang, H. Shen, Y. Tan, and N. Xiong, "Efficient protocols for privacy preserving matching against distributed datasets, " in Information and Communications Security. Berlin, Germany: Springer-Verlag, 2006, pp. 210-227.
    • (2006) Information and Communications Security , pp. 210-227
    • Sang, Y.1    Shen, H.2    Tan, Y.3    Xiong, N.4
  • 75
    • 41549155611 scopus 로고    scopus 로고
    • Distributed private matching and set operations
    • Berlin, Germany: Springer-Verlag
    • Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations, " in Information Security Practice and Experience. Berlin, Germany: Springer-Verlag, 2008, pp. 347-360.
    • (2008) Information Security Practice and Experience , pp. 347-360
    • Ye, Q.1    Wang, H.2    Pieprzyk, J.3
  • 76
    • 38049043364 scopus 로고    scopus 로고
    • An unconditionally secure protocol for multi-party set intersection
    • Berlin, Germany: Springer-Verlag
    • R. Li and C. Wu, "An unconditionally secure protocol for multi-party set intersection, " in Applied Cryptography and Network Security. Berlin, Germany: Springer-Verlag, 2007, pp. 226-236.
    • (2007) Applied Cryptography and Network Security , pp. 226-236
    • Li, R.1    Wu, C.2
  • 77
    • 77951750318 scopus 로고    scopus 로고
    • Efficient cryptographic primitives for private data mining
    • M. Shaneck and K. Yongdae, "Efficient cryptographic primitives for private data mining, " in Proc. HICSS, 2010, pp. 1-9.
    • (2010) Proc. HICSS , pp. 1-9
    • Shaneck, M.1    Yongdae, K.2
  • 78
    • 79960878565 scopus 로고    scopus 로고
    • FindU: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, C. Ning, Y. Shucheng, and L. Wenjing, "FindU: Privacy-preserving personal profile matching in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 2435-2443.
    • (2011) Proc. IEEE INFOCOM , pp. 2435-2443
    • Li, M.1    Ning, C.2    Shucheng, Y.3    Wenjing, L.4
  • 79
    • 56749173469 scopus 로고    scopus 로고
    • VENETA: Serverless friend-of-friend detection in mobile social networking
    • M. v. Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "VENETA: Serverless friend-of-friend detection in mobile social networking, " in Proc. IEEE WIMOB, 2008, pp. 184-189.
    • (2008) Proc. IEEE WIMOB , pp. 184-189
    • Arb, M.V.1    Bader, M.2    Kuhn, M.3    Wattenhofer, R.4
  • 80
    • 79960871684 scopus 로고    scopus 로고
    • Secure friend discovery in mobile social networks
    • D. Wei, V. Dave, Q. Lili, and Z. Yin, "Secure friend discovery in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 1647-1655.
    • (2011) Proc. IEEE INFOCOM , pp. 1647-1655
    • Wei, D.1    Dave, V.2    Lili, Q.3    Yin, Z.4
  • 81
    • 80052099590 scopus 로고    scopus 로고
    • Privacy-preserving matchmaking for mobile social networking secure against malicious users
    • X. Qi and U. Hengartner, "Privacy-preserving matchmaking for mobile social networking secure against malicious users, " in Proc. PST, 2011, pp. 252-259.
    • (2011) Proc. PST , pp. 252-259
    • Qi, X.1    Hengartner, U.2
  • 82
    • 84861649075 scopus 로고    scopus 로고
    • Fine-grained private matching for proximity-based mobile social networking
    • R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. IEEE INFOCOM, 2012, pp. 1969-1977.
    • (2012) Proc. IEEE INFOCOM , pp. 1969-1977
    • Zhang, R.1    Zhang, Y.2    Sun, J.3    Yan, G.4
  • 83
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy, " in Proc. PERVASIVE, 2005, pp. 152-170.
    • (2005) Proc. PERVASIVE , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 85
    • 84872001538 scopus 로고    scopus 로고
    • Utilizing social links for location privacy in opportunistic delay-tolerant networks
    • S. Zakhary and M. Radenkovic, "Utilizing social links for location privacy in opportunistic delay-tolerant networks, " in Proc. IEEE ICC, 2012, pp. 1059-1063.
    • (2012) Proc. IEEE ICC , pp. 1059-1063
    • Zakhary, S.1    Radenkovic, M.2
  • 86
    • 79955564774 scopus 로고    scopus 로고
    • Location-related privacy in geo-social networks
    • May/Jun.
    • C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen, "Location-related privacy in geo-social networks, " IEEE Internet Comput., vol. 15, no. 3, pp. 20-27, May/Jun. 2011.
    • (2011) IEEE Internet Comput. , vol.15 , Issue.3 , pp. 20-27
    • Vicente, C.R.1    Freni, D.2    Bettini, C.3    Jensen, C.S.4
  • 87
    • 84880534447 scopus 로고    scopus 로고
    • Nearby friend alert: Location anonymity in mobile geo-social networks
    • in press
    • H. Li, H. Hu, and J. Xu, "Nearby friend alert: Location anonymity in mobile geo-social networks, " IEEE Pervasive Comput., in press, DOI: 10.1109/MPRV.2012.82.
    • IEEE Pervasive Comput
    • Li, H.1    Hu, H.2    Xu, J.3
  • 88
    • 85028223215 scopus 로고    scopus 로고
    • Enhancing mobile social network privacy
    • C. Wei, W. Jie, and C. C. Tan, "Enhancing mobile social network privacy, " in Proc. IEEE GLOBECOM, 2011, pp. 1-5.
    • (2011) Proc. IEEE GLOBECOM , pp. 1-5
    • Wei, C.1    Jie, W.2    Tan, C.C.3
  • 89
    • 84866513570 scopus 로고    scopus 로고
    • Morality-driven data forwarding with privacy preservation in mobile social networks
    • Sep.
    • X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, "Morality-driven data forwarding with privacy preservation in mobile social networks, " IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3209-3222, Sep. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.7 , pp. 3209-3222
    • Liang, X.1    Li, X.2    Luan, T.H.3    Lu, R.4    Lin, X.5    Shen, X.6
  • 91
    • 79960883633 scopus 로고    scopus 로고
    • APPLAUS: A privacy-preserving location proof updating system for location-based services
    • Z. Zhichao and C. Guohong, "APPLAUS: A privacy-preserving location proof updating system for location-based services, " in Proc. IEEE INFOCOM, 2011, pp. 1889-1897.
    • (2011) Proc. IEEE INFOCOM , pp. 1889-1897
    • Zhichao, Z.1    Guohong, C.2
  • 92
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
    • Jan.
    • L. Rongxing, L. Xiaodong, T. H. Luan, L. Xiaohui, and S. Xuemin, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs, " IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.1 , pp. 86-96
    • Rongxing, L.1    Xiaodong, L.2    Luan, T.H.3    Xiaohui, L.4    Xuemin, S.5
  • 93
    • 84870434696 scopus 로고    scopus 로고
    • Toward privacy preserving and collusion resistance in a location proof updating system
    • Jan.
    • Z. Zhu and G. Cao, "Toward privacy preserving and collusion resistance in a location proof updating system, " IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 51-64, Jan. 2013.
    • (2013) IEEE Trans. Mobile Comput. , vol.12 , Issue.1 , pp. 51-64
    • Zhu, Z.1    Cao, G.2
  • 94
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • Jan.
    • B. Gedik and L. Ling, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Ling, L.2
  • 95
    • 77953992015 scopus 로고    scopus 로고
    • Social-K: Real-time K-anonymity guarantees for social network applications
    • A. Beach, M. Gartrell, and R. Han, "Social-K: Real-time K-anonymity guarantees for social network applications, " in Proc. IEEE PERCOM, 2010, pp. 600-606.
    • (2010) Proc. IEEE PERCOM , pp. 600-606
    • Beach, A.1    Gartrell, M.2    Han, R.3
  • 96
    • 84857789593 scopus 로고    scopus 로고
    • A dynamic privacy-prkey management scheme for location-based services in VANETs
    • Mar.
    • R. Lu, X. Lin, X. Liang, and X. Shen, "A dynamic privacy-prkey management scheme for location-based services in VANETs, " IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127-139, Mar. 2012.
    • (2012) IEEE Trans. Intell. Transp. Syst. , vol.13 , Issue.1 , pp. 127-139
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 97
    • 75449091361 scopus 로고    scopus 로고
    • PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks
    • Feb.
    • R. Kui, Y. Shucheng, L. Wenjing, and Z. Yanchao, "PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks, " IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 2, pp. 203-215, Feb. 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.2 , pp. 203-215
    • Kui, R.1    Shucheng, Y.2    Wenjing, L.3    Yanchao, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.