메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Location Privacy via Private Proximity Testing

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; PRIVACY-PRESERVING TECHNIQUES;

EID: 85150485002     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (275)

References (52)
  • 4
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46–55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A. R.1    Stajano, F.2
  • 6
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires’ problem
    • F. Boudot, B. Schoenmakers, and J. Traore. A fair and efficient solution to the socialist millionaires’ problem. Discrete Applied Mathematics, 111:23–36, 2001.
    • (2001) Discrete Applied Mathematics , vol.111 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traore, J.3
  • 10
    • 38049094878 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Springer
    • L. K. Dawn and D. Song. Privacy-preserving set operations. In Proc. of Crypto, pages 241–257. Springer, 2005.
    • (2005) Proc. of Crypto , pp. 241-257
    • Dawn, L. K.1    Song, D.2
  • 11
    • 70349313631 scopus 로고    scopus 로고
    • Inferring friendship network structure by using mobile phone data
    • August
    • N. Eagle, A. S. Pentland, and D. Lazer. Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106(36):15274–15278, August 2009.
    • (2009) Proceedings of the National Academy of Sciences , vol.106 , Issue.36 , pp. 15274-15278
    • Eagle, N.1    Pentland, A. S.2    Lazer, D.3
  • 12
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Comm. of the ACM, 39:77–85, 1996.
    • (1996) Comm. of the ACM , vol.39 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 13
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Springer-Verlag
    • M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Proc. of Euro-crypt’04, pages 1–19. Springer-Verlag, 2004.
    • (2004) Proc. of Euro-crypt’04 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 15
  • 17
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • ACM
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys’03, pages 31–42. ACM, 2003.
    • (2003) MobiSys’03 , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 18
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In Theory of cryptography (TCC), pages 155–175, 2008.
    • (2008) Theory of cryptography (TCC) , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 20
    • 70249084540 scopus 로고    scopus 로고
    • N-smarts: networked suite of mobile atmospheric real-time sensors
    • ACM
    • R. Honicky, E. A. Brewer, E. Paulos, and R. White. N-smarts: networked suite of mobile atmospheric real-time sensors. In NSDR’08, pages 25–30. ACM, 2008.
    • (2008) NSDR’08 , pp. 25-30
    • Honicky, R.1    Brewer, E. A.2    Paulos, E.3    White, R.4
  • 21
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
    • S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Proc. of Theory of Cryptography, pages 577–594, 2009.
    • (2009) Proc. of Theory of Cryptography , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 26
    • 0345058962 scopus 로고    scopus 로고
    • Verifiable homomorphic oblivious transfer and private equality test
    • H. Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In Proc. of Asiacrypt, pages 416–433, 2003.
    • (2003) Proc. of Asiacrypt , pp. 416-433
    • Lipmaa, H.1
  • 27
    • 77954179758 scopus 로고    scopus 로고
    • Signal authentication: A secure civil gnss for today
    • October
    • S. Lo, D. D. Loenzo, P. Enge, and P. Bradley. Signal authentication: A secure civil gnss for today. Inside GNSS Magazine, 4(5), October 2009. www.insidegnss.com/node/1633.
    • (2009) Inside GNSS Magazine , vol.4 , Issue.5
    • Lo, S.1    Loenzo, D. D.2    Enge, P.3    Bradley, P.4
  • 35
    • 84946418789 scopus 로고    scopus 로고
    • VPriv: Protecting Privacy in Location-Based Vehicular Services
    • Montreal, Canada, August
    • R. A. Popa, H. Balakrishnan, and A. Blumberg. VPriv: Protecting Privacy in Location-Based Vehicular Services. In 18th USENIX Security Symposium, Montreal, Canada, August 2009.
    • (2009) 18th USENIX Security Symposium
    • Popa, R. A.1    Balakrishnan, H.2    Blumberg, A.3
  • 38
    • 69949157375 scopus 로고    scopus 로고
    • Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden?
    • R. Ravichandran, M. Benisch, P. G. Kelley, and N. M. Sadeh. Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden? In PETS, pages 1–18, 2009.
    • (2009) PETS , pp. 1-18
    • Ravichandran, R.1    Benisch, M.2    Kelley, P. G.3    Sadeh, N. M.4
  • 40
    • 84979822702 scopus 로고    scopus 로고
    • The tolls of privacy: An underestimated roadblock for electronic toll collection usage
    • P. F. Riley. The tolls of privacy: An underestimated roadblock for electronic toll collection usage. Computer Law and Security Report, 24(6):521 – 528, 2008.
    • (2008) Computer Law and Security Report , vol.24 , Issue.6 , pp. 521-528
    • Riley, P. F.1
  • 42
  • 44
  • 45
    • 84898111360 scopus 로고    scopus 로고
    • FaceTrust: Assessing the Credibility of Online Personas via Social Networks
    • M. Sirivianos, K. Kim, and X. Yang. FaceTrust: Assessing the Credibility of Online Personas via Social Networks. In Usenix HotSec, 2009.
    • (2009) Usenix HotSec
    • Sirivianos, M.1    Kim, K.2    Yang, X.3
  • 48
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can’t encrypt: A usability evaluation of PGP 5.0
    • A. Whitten and J. D. Tygar. Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999.
    • (1999) 8th USENIX Security Symposium
    • Whitten, A.1    Tygar, J. D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.