-
1
-
-
81855199790
-
Applications, architectures, and protocol design issues for mobile social networks: A survey
-
Dec.
-
N. Kayastha, D. Niyato, P. Wang, and E. Hossain, "Applications, architectures, and protocol design issues for mobile social networks: A survey, " Proc. IEEE, vol. 99, no. 12, pp. 2130-2158, Dec. 2011.
-
(2011)
Proc. IEEE
, vol.99
, Issue.12
, pp. 2130-2158
-
-
Kayastha, N.1
Niyato, D.2
Wang, P.3
Hossain, E.4
-
2
-
-
84881315820
-
Mobile social networks: Architectures, social properties and key research challenges
-
3rd Qtr.
-
N. Vastardis and K. Yang, "Mobile social networks: Architectures, social properties and key research challenges, " IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 1355-1371, 3rd Qtr., 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.3
, pp. 1355-1371
-
-
Vastardis, N.1
Yang, K.2
-
3
-
-
33947176178
-
Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks
-
Nov.
-
L. Pelusi, A. Passarella, and M. Conti, "Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks, " IEEE Commun. Mag., vol. 44, no. 11, pp. 134-141, Nov. 2006.
-
(2006)
IEEE Commun. Mag.
, vol.44
, Issue.11
, pp. 134-141
-
-
Pelusi, L.1
Passarella, A.2
Conti, M.3
-
4
-
-
1242310099
-
A delay-tolerant network architecture for challenged Internets
-
K. Fall, "A delay-tolerant network architecture for challenged Internets, " in Proc. SIGCOMM, 2003, pp. 27-34.
-
(2003)
Proc. SIGCOMM
, pp. 27-34
-
-
Fall, K.1
-
5
-
-
84860886202
-
Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges
-
2nd Qtr.
-
M. Khabbaz, C. M. Assi, and W. Fawaz, "Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges, " IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 607-640, 2nd Qtr. 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.2
, pp. 607-640
-
-
Khabbaz, M.1
Assi, C.M.2
Fawaz, W.3
-
6
-
-
72949107570
-
The concept of opportunistic networks and their research challenges in privacy and security
-
S. K. Makki, P. Reiher, K. Makki, N. Pissinou, and S. Makki, Eds. New York, NY, USA: Springer-Verlag
-
L. Lilien, Z. Kamal, V. Bhuse, and A. Gupta, "The concept of opportunistic networks and their research challenges in privacy and security, " in Mobile and Wireless Network Security and Privacy, S. K. Makki, P. Reiher, K. Makki, N. Pissinou, and S. Makki, Eds. New York, NY, USA: Springer-Verlag, 2007, pp. 85-117.
-
(2007)
Mobile and Wireless Network Security and Privacy
, pp. 85-117
-
-
Lilien, L.1
Kamal, Z.2
Bhuse, V.3
Gupta, A.4
-
7
-
-
66549119801
-
Opportunistic sensing: Security challenges for the new paradigm
-
A. Kapadia, D. Kotz, and N. Triandopoulos, "Opportunistic sensing: Security challenges for the new paradigm, " in Proc. COMSNETS, 2009, pp. 127-136.
-
(2009)
Proc. COMSNETS
, pp. 127-136
-
-
Kapadia, A.1
Kotz, D.2
Triandopoulos, N.3
-
8
-
-
79958001385
-
Security challenges in opportunistic communication
-
A. Shikfa, "Security challenges in opportunistic communication, " in Proc. IEEE Conf. Exhib. GCC, 2011, pp. 425-428.
-
(2011)
Proc. IEEE Conf. Exhib. GCC
, pp. 425-428
-
-
Shikfa, A.1
-
9
-
-
70849109966
-
Solutions to security and privacy issues in mobile social networking
-
A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacy issues in mobile social networking, " in Proc. Int. Conf. CSE, 2009, pp. 1036-1042.
-
(2009)
Proc. Int. Conf. CSE
, pp. 1036-1042
-
-
Beach, A.1
Gartrell, M.2
Han, R.3
-
10
-
-
84947273682
-
The Sybil attack
-
J. R. Douceur, "The Sybil attack, " in Proc. 1st IPTPS, 2002, pp. 251-260.
-
(2002)
Proc. 1st IPTPS
, pp. 251-260
-
-
Douceur, J.R.1
-
11
-
-
50049120615
-
Detecting the Sybil attack in mobile ad hoc networks
-
C. Piro, C. Shields, and B. N. Levine, "Detecting the Sybil attack in mobile ad hoc networks, " in Proc. Securecomm. Workshops, 2006, pp. 1-11.
-
(2006)
Proc. Securecomm. Workshops
, pp. 1-11
-
-
Piro, C.1
Shields, C.2
Levine, B.N.3
-
12
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan.-Mar.
-
S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-organized public-key management for mobile ad hoc networks, " IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
13
-
-
77953900788
-
Social trust in opportunistic networks
-
S. Trifunovic, F. Legendre, and C. Anastasiades, "Social trust in opportunistic networks, " in Proc. IEEE INFOCOM, 2010, pp. 1-6.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-6
-
-
Trifunovic, S.1
Legendre, F.2
Anastasiades, C.3
-
14
-
-
33847708791
-
Delay-tolerant broadcasting
-
Mar.
-
G. Karlsson, V. Lenders, and M. May, "Delay-tolerant broadcasting, " IEEE Trans. Broadcast., vol. 53, no. 1, pp. 369-381, Mar. 2007.
-
(2007)
IEEE Trans. Broadcast.
, vol.53
, Issue.1
, pp. 369-381
-
-
Karlsson, G.1
Lenders, V.2
May, M.3
-
15
-
-
85028225044
-
PodNetSec: Secure opportunistic content dissemination
-
S. Trifunovic, C. Anastasiades, B. Distl, and F. Legendre, "PodNetSec: Secure opportunistic content dissemination, " in Proc. ACM Mobisys, 2010, p. 1.
-
(2010)
Proc. ACM Mobisys
, pp. 1
-
-
Trifunovic, S.1
Anastasiades, C.2
Distl, B.3
Legendre, F.4
-
16
-
-
45749109010
-
Sybil-Guard: Defending against Sybil attacks via social networks
-
Jun.
-
Y. Haifeng, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "Sybil-Guard: Defending against Sybil attacks via social networks, " IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 576-589, Jun. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.3
, pp. 576-589
-
-
Haifeng, Y.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.D.4
-
17
-
-
77953317298
-
Sybil attacks against mobile users: Friends and foes to the rescue
-
D. Quercia and S. Hailes, "Sybil attacks against mobile users: Friends and foes to the rescue, " in Proc. IEEE INFOCOM, 2010, pp. 1-5.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-5
-
-
Quercia, D.1
Hailes, S.2
-
18
-
-
84861603155
-
SybilDefender: Defend against sybil attacks in large social networks
-
W. Wei, F. Xu, V. C. Tan, and Q. Li, "SybilDefender: Defend against sybil attacks in large social networks, " in Proc. IEEE INFOCOM, 2012, pp. 1951-1959.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1951-1959
-
-
Wei, W.1
Xu, F.2
Tan, V.C.3
Li, Q.4
-
19
-
-
79960871268
-
Keep your friends close: Incorporating trust into social network-based Sybil defenses
-
A. Mohaisen, N. Hopper, and K. Yongdae, "Keep your friends close: Incorporating trust into social network-based Sybil defenses, " in Proc. IEEE INFOCOM, 2011, pp. 1943-1951.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1943-1951
-
-
Mohaisen, A.1
Hopper, N.2
Yongdae, K.3
-
20
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
Jan.-Mar.
-
D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses, " IEEE Pervasive Comput., vol. 7, no. 1, pp. 74-81, Jan.-Mar. 2008.
-
(2008)
IEEE Pervasive Comput.
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
21
-
-
77952910261
-
RADON: Reputation-assisted data forwarding in opportunistic networks
-
N. Li and S. K. Das, "RADON: Reputation-assisted data forwarding in opportunistic networks, " in Proc. MobiOpp, 2010, pp. 8-14.
-
(2010)
Proc. MobiOpp
, pp. 8-14
-
-
Li, N.1
Das, S.K.2
-
22
-
-
84877583840
-
A trust-based framework for data forwarding in opportunistic networks
-
Jun.
-
N. Li and S. K. Das, "A trust-based framework for data forwarding in opportunistic networks, " Ad Hoc Netw., vol. 11, no. 4, pp. 1497-1509, Jun. 2013.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.4
, pp. 1497-1509
-
-
Li, N.1
Das, S.K.2
-
23
-
-
84866497422
-
Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application
-
E. Miluzzo, N. D. Lane, K. Fodor, R. Peterson, H. Lu, M. Musolesi, S. B. Eisenman, X. Zheng, and A. T. Campbell, "Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application, " in Proc. ACM SenSys, 2008, pp. 337-350.
-
(2008)
Proc. ACM SenSys
, pp. 337-350
-
-
Miluzzo, E.1
Lane, N.D.2
Fodor, K.3
Peterson, R.4
Lu, H.5
Musolesi, M.6
Eisenman, S.B.7
Zheng, X.8
Campbell, A.T.9
-
24
-
-
78449309395
-
SocialWiki: Bring order to wiki systems with social context
-
H. Zhao, S. Ye, P. Bhattacharyya, J. Rowe, K. Gribble, and S. F. Wu, "SocialWiki: Bring order to wiki systems with social context, " in Proc. Soc. Inf., 2010, pp. 232-247.
-
(2010)
Proc. Soc. Inf.
, pp. 232-247
-
-
Zhao, H.1
Ye, S.2
Bhattacharyya, P.3
Rowe, J.4
Gribble, K.5
Wu, S.F.6
-
25
-
-
80053169249
-
Trustworthy opportunistic sensing: A social computing paradigm
-
H. Johnson, N. Lavesson, D. Oliveira, and S. F. Wu, "Trustworthy opportunistic sensing: A social computing paradigm, " in Proc. IEEE Int. Conf. IRI, 2011, pp. 513-518.
-
(2011)
Proc. IEEE Int. Conf. IRI
, pp. 513-518
-
-
Johnson, H.1
Lavesson, N.2
Oliveira, D.3
Wu, S.F.4
-
26
-
-
78249236236
-
MobiTrust: Trust management system in mobile social computing
-
L. Juan, Z. Zonghua, and Z. Weiyi, "MobiTrust: Trust management system in mobile social computing, " in Proc. IEEE 10th Int. Conf. CIT, 2010, pp. 954-959.
-
(2010)
Proc. IEEE 10th Int. Conf. CIT
, pp. 954-959
-
-
Juan, L.1
Zonghua, Z.2
Weiyi, Z.3
-
27
-
-
84858666726
-
Iterative trust and reputation management using belief propagation
-
May/Jun.
-
E. Ayday and F. Fekri, "Iterative trust and reputation management using belief propagation, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 3, pp. 375-386, May/Jun. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.3
, pp. 375-386
-
-
Ayday, E.1
Fekri, F.2
-
28
-
-
84856255130
-
SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems
-
Mar./Apr.
-
A. Das and M. M. Islam, "SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 261-274, Mar./Apr. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.2
, pp. 261-274
-
-
Das, A.1
Islam, M.M.2
-
29
-
-
84891775418
-
Enabling trustworthy service evaluation in service-oriented mobile social networks
-
in press
-
X. Liang, X. Lin, and X. Shen, "Enabling trustworthy service evaluation in service-oriented mobile social networks, " IEEE Trans. Parallel Distrib. Syst., in press, DOI: 10.1109/TPDS.2013.37.
-
IEEE Trans. Parallel Distrib. Syst
-
-
Liang, X.1
Lin, X.2
Shen, X.3
-
30
-
-
80051768284
-
Sustaining cooperation in multi-hop wireless networks
-
R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Sustaining cooperation in multi-hop wireless networks, " in Proc. NSDI, 2005, vol. 2, pp. 231-244.
-
(2005)
Proc. NSDI
, vol.2
, pp. 231-244
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
31
-
-
77953317183
-
Stimulating cooperation in multi-hop wireless networks using cheating detection system
-
M. E. Mahmoud and S. Xuemin, "Stimulating cooperation in multi-hop wireless networks using cheating detection system, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Mahmoud, M.E.1
Xuemin, S.2
-
32
-
-
84879182183
-
SUCCESS: A secure user-centric and social-aware reputation based incentive scheme for DTNs
-
L. Wei, H. Zhu, Z. Cao, and X. Shen, "SUCCESS: A secure user-centric and social-aware reputation based incentive scheme for DTNs, " Ad Hoc Wireless Sensor Netw., vol. 19, no. 1/2, pp. 95-118, 2013.
-
(2013)
Ad Hoc Wireless Sensor Netw.
, vol.19
, Issue.1-2
, pp. 95-118
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Shen, X.4
-
33
-
-
70350238158
-
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
-
Oct.
-
Z. Haojin, L. Xiaodong, L. Rongxing, F. Yanfei, and S. Xuemin, "SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks, " IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628-4639, Oct. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.8
, pp. 4628-4639
-
-
Haojin, Z.1
Xiaodong, L.2
Rongxing, L.3
Yanfei, F.4
Xuemin, S.5
-
34
-
-
84861139529
-
Give2Get: Forwarding in social mobile wireless networks of selfish individuals
-
Jul./Aug.
-
A. Mei and J. Stefa, "Give2Get: Forwarding in social mobile wireless networks of selfish individuals, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 4, pp. 569-582, Jul./Aug. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.4
, pp. 569-582
-
-
Mei, A.1
Stefa, J.2
-
35
-
-
70349662505
-
Selfishness, altruism and message spreading in mobile social networks
-
H. Pan, X. Kuang, V. O. K. Li, J. Crowcroft, V. Latora, and P. Lio, "Selfishness, altruism and message spreading in mobile social networks, " in Proc. IEEE INFOCOM, 2009, pp. 1-6.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1-6
-
-
Pan, H.1
Kuang, X.2
Li, V.O.K.3
Crowcroft, J.4
Latora, V.5
Lio, P.6
-
36
-
-
77953319755
-
Routing in socially selfish delay tolerant networks
-
L. Qinghua, Z. Sencun, and C. Guohong, "Routing in socially selfish delay tolerant networks, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Qinghua, L.1
Sencun, Z.2
Guohong, C.3
-
37
-
-
85028221670
-
Internal threats avoiding based forwarding protocol in social selfish delay tolerant networks
-
G. Xin, L. Cong, C. Min, C. Hongyang, and T. Ohtsuki, "Internal threats avoiding based forwarding protocol in social selfish delay tolerant networks, " in Proc. ICC, 2011, pp. 1-6.
-
(2011)
Proc. ICC
, pp. 1-6
-
-
Xin, G.1
Cong, L.2
Min, C.3
Hongyang, C.4
Ohtsuki, T.5
-
38
-
-
80052993222
-
Social-based trust in mobile opportunistic networks
-
A. Mtibaa and K. A. Harras, "Social-based trust in mobile opportunistic networks, " in Proc. ICCCN, 2011, pp. 1-6.
-
(2011)
Proc. ICCCN
, pp. 1-6
-
-
Mtibaa, A.1
Harras, K.A.2
-
39
-
-
67650459766
-
Trust and privacy: Informal ways to assess risk on opportunistic exchanges
-
M. R. P. Gonçalves, E. D. S. Moreira, and L. A. F. Martimiano, "Trust and privacy: Informal ways to assess risk on opportunistic exchanges, " Int J. Comput. Sci. Appl., vol. 6, no. 2, pp. 66-85, 2009.
-
(2009)
Int J. Comput. Sci. Appl.
, vol.6
, Issue.2
, pp. 66-85
-
-
Gonçalves, M.R.P.1
Moreira, E.D.S.2
Martimiano, L.A.F.3
-
40
-
-
69249223002
-
Barter trade improves message delivery in opportunistic networks
-
Jan.
-
L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda, "Barter trade improves message delivery in opportunistic networks, " Ad Hoc Networks, vol. 8, no. 1, pp. 1-14, Jan. 2010.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.1
, pp. 1-14
-
-
Buttyán, L.1
Dóra, L.2
Félegyházi, M.3
Vajda, I.4
-
41
-
-
51649113091
-
Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution
-
Oct.
-
C. Boldrini, M. Conti, and A. Passarella, "Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution, " Pervasive Mobile Comput., vol. 4, no. 5, pp. 633-657, Oct. 2008.
-
(2008)
Pervasive Mobile Comput.
, vol.4
, Issue.5
, pp. 633-657
-
-
Boldrini, C.1
Conti, M.2
Passarella, A.3
-
42
-
-
74349116503
-
Privacy in context-based and epidemic forwarding
-
A. Shikfa, M. Onen, and R. Molva, "Privacy in context-based and epidemic forwarding, " in Proc. IEEE WoWMoM, 2009, pp. 1-7.
-
(2009)
Proc. IEEE WoWMoM
, pp. 1-7
-
-
Shikfa, A.1
Onen, M.2
Molva, R.3
-
43
-
-
77951284618
-
Practical security in P2P-based social networks
-
K. Graffi, P. Mukherjee, B. Menges, D. Hartung, A. Kovacevic, and R. Steinmetz, "Practical security in P2P-based social networks, " in Proc. IEEE LCN, 2009, pp. 269-272.
-
(2009)
Proc. IEEE LCN
, pp. 269-272
-
-
Graffi, K.1
Mukherjee, P.2
Menges, B.3
Hartung, D.4
Kovacevic, A.5
Steinmetz, R.6
-
44
-
-
84855674646
-
A secure handshake scheme with symptoms-matching for mHealthcare social network
-
Dec.
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mHealthcare social network, " J. Mobile Netw. Appl., vol. 16, no. 6, pp. 683-694, Dec. 2011.
-
(2011)
J. Mobile Netw. Appl.
, vol.16
, Issue.6
, pp. 683-694
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
45
-
-
85028207004
-
An efficient and secure user revocation scheme in mobile social networks
-
L. Xiaohui, L. Xu, L. Rongxing, L. Xiaodong, and S. Xuemin, "An efficient and secure user revocation scheme in mobile social networks, " in Proc. IEEE GLOBECOM, 2011, pp. 1-5.
-
(2011)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Xiaohui, L.1
Xu, L.2
Rongxing, L.3
Xiaodong, L.4
Xuemin, S.5
-
46
-
-
70449465392
-
Dynamic policy based model for trust based access control in P2P applications
-
M. Chatterjee, G. Sivakumar, and B. Menezes, "Dynamic policy based model for trust based access control in P2P applications, " in Proc. IEEE ICC, 2009, pp. 1-5.
-
(2009)
Proc. IEEE ICC
, pp. 1-5
-
-
Chatterjee, M.1
Sivakumar, G.2
Menezes, B.3
-
47
-
-
80052415760
-
Policy-based access control in mobile social ecosystems
-
S. Hachem, A. Toninelli, A. Pathak, and V. Issarny, "Policy-based access control in mobile social ecosystems, " in Proc. IEEE POLICY, 2011, pp. 57-64.
-
(2011)
Proc. IEEE POLICY
, pp. 57-64
-
-
Hachem, S.1
Toninelli, A.2
Pathak, A.3
Issarny, V.4
-
48
-
-
77953313061
-
SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
L. Rongxing, L. Xiaodong, and S. Xuemin, "SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Rongxing, L.1
Xiaodong, L.2
Xuemin, S.3
-
49
-
-
70449632776
-
Leveraging social contacts for message confidentiality in delay tolerant networks
-
K. El Defrawy, J. Solis, and G. Tsudik, "Leveraging social contacts for message confidentiality in delay tolerant networks, " in Proc. IEEE COMPSAC, 2009, pp. 271-279.
-
(2009)
Proc. IEEE COMPSAC
, pp. 271-279
-
-
El Defrawy, K.1
Solis, J.2
Tsudik, G.3
-
50
-
-
67650233907
-
Hierarchical identity based cryptography for end-to-end security in DTNs
-
R. Patra, S. Surana, and S. Nedevschi, "Hierarchical identity based cryptography for end-to-end security in DTNs, " in Proc. ICCP, 2008, pp. 223-230.
-
(2008)
Proc. ICCP
, pp. 223-230
-
-
Patra, R.1
Surana, S.2
Nedevschi, S.3
-
51
-
-
84858017885
-
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
-
May
-
Z. Jia, X. Lin, S.-H. Tan, L. Li, and Y. Yang, "Public key distribution scheme for delay tolerant networks based on two-channel cryptography, " J. Netw. Comput. Appl., vol. 35, no. 3, pp. 905-913, May 2012.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.3
, pp. 905-913
-
-
Jia, Z.1
Lin, X.2
Tan, S.-H.3
Li, L.4
Yang, Y.5
-
52
-
-
85028223212
-
Security in unstructured opportunistic networks: Vague communication and counter intelligence functionality
-
Jan.
-
K. S. Rao, M. Lokeswari, and J. Srikanth, "Security in unstructured opportunistic networks: Vague communication and counter intelligence functionality, " Int. J. Comput. Sci. Telecommun., vol. 3, no. 1, pp. 54-61, Jan. 2012.
-
(2012)
Int. J. Comput. Sci. Telecommun.
, vol.3
, Issue.1
, pp. 54-61
-
-
Rao, K.S.1
Lokeswari, M.2
Srikanth, J.3
-
53
-
-
79953123749
-
-
Dept. Comput. Sci., Univ. Colorado Boulder, Boulder, CO, USA, Tech. Rep. CU-CS-1054-09, Jun.
-
A. Beach, M. Gartrell, B. Ray, and R. Han, "Secure SocialAware: A Security Framework for Mobile Social Networking Applications, " Dept. Comput. Sci., Univ. Colorado Boulder, Boulder, CO, USA, Tech. Rep. CU-CS-1054-09, Jun. 2009.
-
(2009)
Secure SocialAware: A Security Framework for Mobile Social Networking Applications
-
-
Beach, A.1
Gartrell, M.2
Ray, B.3
Han, R.4
-
54
-
-
73849129514
-
Providing location security in vehicular ad hoc networks
-
Dec.
-
Y. Gongjun, S. Olariu, and M. C. Weigle, "Providing location security in vehicular ad hoc networks, " IEEE Wireless Commun., vol. 16, no. 6, pp. 48-55, Dec. 2009.
-
(2009)
IEEE Wireless Commun.
, vol.16
, Issue.6
, pp. 48-55
-
-
Gongjun, Y.1
Olariu, S.2
Weigle, M.C.3
-
55
-
-
80051889537
-
Location cheating: A security challenge to location-based social network services
-
H. Wenbo, L. Xue, and R. Mai, "Location cheating: A security challenge to location-based social network services, " in Proc. ICDCS, 2011, pp. 740-749.
-
(2011)
Proc. ICDCS
, pp. 740-749
-
-
Wenbo, H.1
Xue, L.2
Mai, R.3
-
57
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Sep.
-
Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks, " Wireless Netw., vol. 9, no. 5, pp. 545-556, Sep. 2003.
-
(2003)
Wireless Netw.
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
58
-
-
74849136546
-
A framework for intrusion detection systems by social network analysis methods in ad hoc networks
-
Nov./Dec.
-
W. Wang, H. Man, and Y. Liu, "A framework for intrusion detection systems by social network analysis methods in ad hoc networks, " Security Commun. Netw., vol. 2, no. 6, pp. 669-685, Nov./Dec. 2009.
-
(2009)
Security Commun. Netw.
, vol.2
, Issue.6
, pp. 669-685
-
-
Wang, W.1
Man, H.2
Liu, Y.3
-
59
-
-
0005063385
-
Onion routing
-
Feb.
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing, " Commun. ACM, vol. 42, no. 2, pp. 39-41, Feb. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
60
-
-
50049095154
-
Packet coding for strong anonymity in ad hocnetworks
-
I. Aad, C. Castelluccia, and J. P. Hubaux, "Packet coding for strong anonymity in ad hocnetworks, " in Proc. Securecomm Workshops, 2006, pp. 1-10.
-
(2006)
Proc. Securecomm Workshops
, pp. 1-10
-
-
Aad, I.1
Castelluccia, C.2
Hubaux, J.P.3
-
61
-
-
70249088359
-
NOYB: Privacy in online social networks
-
S. Guha, K. Tang, and P. Francis, "NOYB: Privacy in online social networks, " in Proc. WOSN, 2008, pp. 49-54.
-
(2008)
Proc. WOSN
, pp. 49-54
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
62
-
-
77952919816
-
Hide-and-Lie: Enhancing application-level privacy in opportunistic networks
-
L. Dóra and T. Holczer, "Hide-and-Lie: Enhancing application-level privacy in opportunistic networks, " in Proc. MobiOpp, 2010, pp. 135-142.
-
(2010)
Proc. MobiOpp
, pp. 135-142
-
-
Dóra, L.1
Holczer, T.2
-
64
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A practical attack to de-anonymize social network users, " in Proc. IEEE Symp. Security Privacy, 2010, pp. 223-238.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 223-238
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
65
-
-
77954016786
-
Privacy-enhanced social network routing in opportunistic networks
-
I. Parris, G. Bigwood, and T. Henderson, "Privacy-enhanced social network routing in opportunistic networks, " in Proc. IEEE PERCOM, 2010, pp. 624-629.
-
(2010)
Proc. IEEE PERCOM
, pp. 624-629
-
-
Parris, I.1
Bigwood, G.2
Henderson, T.3
-
66
-
-
84986576068
-
De-anonymizing dynamic social networks
-
D. Xuan, Z. Lan, W. Zhiguo, and G. Ming, "De-anonymizing dynamic social networks, " in Proc. IEEE GLOBECOM, 2011, pp. 1-6.
-
(2011)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Xuan, D.1
Lan, Z.2
Zhiguo, W.3
Ming, G.4
-
67
-
-
74049107299
-
A performance evaluation framework for fair solutions in ad hoc networks
-
M. Dramitinos, R. Vannier, and I. G. Lassous, "A performance evaluation framework for fair solutions in ad hoc networks, " in Proc. ACM MSWiM, 2009, pp. 46-53.
-
(2009)
Proc. ACM MSWiM
, pp. 46-53
-
-
Dramitinos, M.1
Vannier, R.2
Lassous, I.G.3
-
68
-
-
80052792972
-
FOG: Fairness in mobile opportunistic networking
-
A. Mtibaa and K. A. Harras, "FOG: Fairness in mobile opportunistic networking, " in Proc. IEEE SECON, 2011, pp. 260-268.
-
(2011)
Proc. IEEE SECON
, pp. 260-268
-
-
Mtibaa, A.1
Harras, K.A.2
-
69
-
-
0031682832
-
Efficient and practical fair exchange protocols with off-line TTP
-
B. Feng, R. H. Deng, and M. Wenbo, "Efficient and practical fair exchange protocols with off-line TTP, " in Proc. IEEE Symp. Security Privacy, 1998, pp. 77-85.
-
(1998)
Proc. IEEE Symp. Security Privacy
, pp. 77-85
-
-
Feng, B.1
Deng, R.H.2
Wenbo, M.3
-
70
-
-
84976804419
-
How to exchange (secret) keys
-
May
-
M. Blum, "How to exchange (secret) keys, " ACM Trans. Comput. Syst., vol. 1, no. 2, pp. 175-193, May 1983.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
71
-
-
80052161755
-
Finegrained identification with real-time fairness in mobile social networks
-
L. Xiaohui, L. Xu, L. Rongxing, L. Xiaodong, and S. Xuemin, "Finegrained identification with real-time fairness in mobile social networks, " in Proc. IEEE ICC, 2011, pp. 1-5.
-
(2011)
Proc. IEEE ICC
, pp. 1-5
-
-
Xiaohui, L.1
Xu, L.2
Rongxing, L.3
Xiaodong, L.4
Xuemin, S.5
-
72
-
-
35048820609
-
Efficient private matching and set intersection
-
Berlin, Germany: Springer-Verlag
-
M. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection, " in Advances in Cryptology EUROCRYPT. Berlin, Germany: Springer-Verlag, 2004, pp. 1-19.
-
(2004)
Advances in Cryptology EUROCRYPT
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
73
-
-
33745160750
-
Privacy-preserving set operations
-
Berlin, Germany: Springer-Verlag
-
L. Kissner and D. Song, "Privacy-preserving set operations, " in Advances in Cryptology CRYPTO. Berlin, Germany: Springer-Verlag, 2005, pp. 241-257.
-
(2005)
Advances in Cryptology CRYPTO
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
74
-
-
41549104640
-
Efficient protocols for privacy preserving matching against distributed datasets
-
Berlin, Germany: Springer-Verlag
-
Y. Sang, H. Shen, Y. Tan, and N. Xiong, "Efficient protocols for privacy preserving matching against distributed datasets, " in Information and Communications Security. Berlin, Germany: Springer-Verlag, 2006, pp. 210-227.
-
(2006)
Information and Communications Security
, pp. 210-227
-
-
Sang, Y.1
Shen, H.2
Tan, Y.3
Xiong, N.4
-
75
-
-
41549155611
-
Distributed private matching and set operations
-
Berlin, Germany: Springer-Verlag
-
Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations, " in Information Security Practice and Experience. Berlin, Germany: Springer-Verlag, 2008, pp. 347-360.
-
(2008)
Information Security Practice and Experience
, pp. 347-360
-
-
Ye, Q.1
Wang, H.2
Pieprzyk, J.3
-
76
-
-
38049043364
-
An unconditionally secure protocol for multi-party set intersection
-
Berlin, Germany: Springer-Verlag
-
R. Li and C. Wu, "An unconditionally secure protocol for multi-party set intersection, " in Applied Cryptography and Network Security. Berlin, Germany: Springer-Verlag, 2007, pp. 226-236.
-
(2007)
Applied Cryptography and Network Security
, pp. 226-236
-
-
Li, R.1
Wu, C.2
-
77
-
-
77951750318
-
Efficient cryptographic primitives for private data mining
-
M. Shaneck and K. Yongdae, "Efficient cryptographic primitives for private data mining, " in Proc. HICSS, 2010, pp. 1-9.
-
(2010)
Proc. HICSS
, pp. 1-9
-
-
Shaneck, M.1
Yongdae, K.2
-
78
-
-
79960878565
-
FindU: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, C. Ning, Y. Shucheng, and L. Wenjing, "FindU: Privacy-preserving personal profile matching in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 2435-2443.
-
(2011)
Proc. IEEE INFOCOM
, pp. 2435-2443
-
-
Li, M.1
Ning, C.2
Shucheng, Y.3
Wenjing, L.4
-
79
-
-
56749173469
-
VENETA: Serverless friend-of-friend detection in mobile social networking
-
M. v. Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "VENETA: Serverless friend-of-friend detection in mobile social networking, " in Proc. IEEE WIMOB, 2008, pp. 184-189.
-
(2008)
Proc. IEEE WIMOB
, pp. 184-189
-
-
Arb, M.V.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
-
80
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
D. Wei, V. Dave, Q. Lili, and Z. Yin, "Secure friend discovery in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 1647-1655.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1647-1655
-
-
Wei, D.1
Dave, V.2
Lili, Q.3
Yin, Z.4
-
81
-
-
80052099590
-
Privacy-preserving matchmaking for mobile social networking secure against malicious users
-
X. Qi and U. Hengartner, "Privacy-preserving matchmaking for mobile social networking secure against malicious users, " in Proc. PST, 2011, pp. 252-259.
-
(2011)
Proc. PST
, pp. 252-259
-
-
Qi, X.1
Hengartner, U.2
-
82
-
-
84861649075
-
Fine-grained private matching for proximity-based mobile social networking
-
R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. IEEE INFOCOM, 2012, pp. 1969-1977.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1969-1977
-
-
Zhang, R.1
Zhang, Y.2
Sun, J.3
Yan, G.4
-
83
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy, " in Proc. PERVASIVE, 2005, pp. 152-170.
-
(2005)
Proc. PERVASIVE
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
84
-
-
78649342447
-
An obfuscation-based approach for protecting location privacy
-
Jan./Feb.
-
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, "An obfuscation-based approach for protecting location privacy, " IEEE Trans. Dependable Secure Comput., vol. 8, no. 1, pp. 13-27, Jan./Feb. 2011.
-
(2011)
IEEE Trans. Dependable Secure Comput.
, vol.8
, Issue.1
, pp. 13-27
-
-
Ardagna, C.A.1
Cremonini, M.2
De Capitani Di Vimercati, D.3
Samarati, P.4
-
85
-
-
84872001538
-
Utilizing social links for location privacy in opportunistic delay-tolerant networks
-
S. Zakhary and M. Radenkovic, "Utilizing social links for location privacy in opportunistic delay-tolerant networks, " in Proc. IEEE ICC, 2012, pp. 1059-1063.
-
(2012)
Proc. IEEE ICC
, pp. 1059-1063
-
-
Zakhary, S.1
Radenkovic, M.2
-
86
-
-
79955564774
-
Location-related privacy in geo-social networks
-
May/Jun.
-
C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen, "Location-related privacy in geo-social networks, " IEEE Internet Comput., vol. 15, no. 3, pp. 20-27, May/Jun. 2011.
-
(2011)
IEEE Internet Comput.
, vol.15
, Issue.3
, pp. 20-27
-
-
Vicente, C.R.1
Freni, D.2
Bettini, C.3
Jensen, C.S.4
-
87
-
-
84880534447
-
Nearby friend alert: Location anonymity in mobile geo-social networks
-
in press
-
H. Li, H. Hu, and J. Xu, "Nearby friend alert: Location anonymity in mobile geo-social networks, " IEEE Pervasive Comput., in press, DOI: 10.1109/MPRV.2012.82.
-
IEEE Pervasive Comput
-
-
Li, H.1
Hu, H.2
Xu, J.3
-
88
-
-
85028223215
-
Enhancing mobile social network privacy
-
C. Wei, W. Jie, and C. C. Tan, "Enhancing mobile social network privacy, " in Proc. IEEE GLOBECOM, 2011, pp. 1-5.
-
(2011)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Wei, C.1
Jie, W.2
Tan, C.C.3
-
89
-
-
84866513570
-
Morality-driven data forwarding with privacy preservation in mobile social networks
-
Sep.
-
X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, "Morality-driven data forwarding with privacy preservation in mobile social networks, " IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3209-3222, Sep. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.7
, pp. 3209-3222
-
-
Liang, X.1
Li, X.2
Luan, T.H.3
Lu, R.4
Lin, X.5
Shen, X.6
-
90
-
-
77955903359
-
A distributed privacy-preserving scheme for location-based queries
-
E. Magkos, P. Kotzanikolaou, S. Sioutas, and K. Oikonomou, "A distributed privacy-preserving scheme for location-based queries, " in Proc. IEEE WoWMoM, 2010, pp. 1-6.
-
(2010)
Proc. IEEE WoWMoM
, pp. 1-6
-
-
Magkos, E.1
Kotzanikolaou, P.2
Sioutas, S.3
Oikonomou, K.4
-
91
-
-
79960883633
-
APPLAUS: A privacy-preserving location proof updating system for location-based services
-
Z. Zhichao and C. Guohong, "APPLAUS: A privacy-preserving location proof updating system for location-based services, " in Proc. IEEE INFOCOM, 2011, pp. 1889-1897.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1889-1897
-
-
Zhichao, Z.1
Guohong, C.2
-
92
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
-
Jan.
-
L. Rongxing, L. Xiaodong, T. H. Luan, L. Xiaohui, and S. Xuemin, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs, " IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Rongxing, L.1
Xiaodong, L.2
Luan, T.H.3
Xiaohui, L.4
Xuemin, S.5
-
93
-
-
84870434696
-
Toward privacy preserving and collusion resistance in a location proof updating system
-
Jan.
-
Z. Zhu and G. Cao, "Toward privacy preserving and collusion resistance in a location proof updating system, " IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 51-64, Jan. 2013.
-
(2013)
IEEE Trans. Mobile Comput.
, vol.12
, Issue.1
, pp. 51-64
-
-
Zhu, Z.1
Cao, G.2
-
94
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
Jan.
-
B. Gedik and L. Ling, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Ling, L.2
-
95
-
-
77953992015
-
Social-K: Real-time K-anonymity guarantees for social network applications
-
A. Beach, M. Gartrell, and R. Han, "Social-K: Real-time K-anonymity guarantees for social network applications, " in Proc. IEEE PERCOM, 2010, pp. 600-606.
-
(2010)
Proc. IEEE PERCOM
, pp. 600-606
-
-
Beach, A.1
Gartrell, M.2
Han, R.3
-
96
-
-
84857789593
-
A dynamic privacy-prkey management scheme for location-based services in VANETs
-
Mar.
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A dynamic privacy-prkey management scheme for location-based services in VANETs, " IEEE Trans. Intell. Transp. Syst., vol. 13, no. 1, pp. 127-139, Mar. 2012.
-
(2012)
IEEE Trans. Intell. Transp. Syst.
, vol.13
, Issue.1
, pp. 127-139
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
97
-
-
75449091361
-
PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks
-
Feb.
-
R. Kui, Y. Shucheng, L. Wenjing, and Z. Yanchao, "PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks, " IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 2, pp. 203-215, Feb. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.2
, pp. 203-215
-
-
Kui, R.1
Shucheng, Y.2
Wenjing, L.3
Yanchao, Z.4
-
98
-
-
84878595251
-
Providing users' anonymity in mobile hybrid networks
-
May
-
C. A. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, "Providing users' anonymity in mobile hybrid networks, " ACM Trans. Internet Technol., vol. 12, no. 3, pp. 1-33, May 2013.
-
(2013)
ACM Trans. Internet Technol.
, vol.12
, Issue.3
, pp. 1-33
-
-
Ardagna, C.A.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
|