-
3
-
-
70450257780
-
Persona: an online social network with user-defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. SIGCOMM Comput. Commun. Rev., 39(4):135–146, 2009.
-
(2009)
SIGCOMM Comput. Commun. Rev
, vol.39
, Issue.4
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
6
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires’ problem
-
F. Boudot, B. Schoenmakers, and J. Traore. A fair and efficient solution to the socialist millionaires’ problem. Discrete Applied Mathematics, 111:23–36, 2001.
-
(2001)
Discrete Applied Mathematics
, vol.111
, pp. 23-36
-
-
Boudot, F.1
Schoenmakers, B.2
Traore, J.3
-
9
-
-
68949136946
-
Efficient robust private set intersection
-
D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung. Efficient robust private set intersection. In Applied Cryptography and Network Security (ACNS), pages 125–142, 2009.
-
(2009)
Applied Cryptography and Network Security (ACNS)
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
10
-
-
38049094878
-
Privacy-preserving set operations
-
Springer
-
L. K. Dawn and D. Song. Privacy-preserving set operations. In Proc. of Crypto, pages 241–257. Springer, 2005.
-
(2005)
Proc. of Crypto
, pp. 241-257
-
-
Dawn, L. K.1
Song, D.2
-
11
-
-
70349313631
-
Inferring friendship network structure by using mobile phone data
-
August
-
N. Eagle, A. S. Pentland, and D. Lazer. Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106(36):15274–15278, August 2009.
-
(2009)
Proceedings of the National Academy of Sciences
, vol.106
, Issue.36
, pp. 15274-15278
-
-
Eagle, N.1
Pentland, A. S.2
Lazer, D.3
-
12
-
-
0030150177
-
Comparing information without leaking it
-
R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Comm. of the ACM, 39:77–85, 1996.
-
(1996)
Comm. of the ACM
, vol.39
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
13
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer-Verlag
-
M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Proc. of Euro-crypt’04, pages 1–19. Springer-Verlag, 2004.
-
(2004)
Proc. of Euro-crypt’04
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
15
-
-
57149129292
-
Private queries in location based services: anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In SIGMOD Conference, pages 121–132, 2008.
-
(2008)
SIGMOD Conference
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
17
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys’03, pages 31–42. ACM, 2003.
-
(2003)
MobiSys’03
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
18
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In Theory of cryptography (TCC), pages 155–175, 2008.
-
(2008)
Theory of cryptography (TCC)
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
20
-
-
70249084540
-
N-smarts: networked suite of mobile atmospheric real-time sensors
-
ACM
-
R. Honicky, E. A. Brewer, E. Paulos, and R. White. N-smarts: networked suite of mobile atmospheric real-time sensors. In NSDR’08, pages 25–30. ACM, 2008.
-
(2008)
NSDR’08
, pp. 25-30
-
-
Honicky, R.1
Brewer, E. A.2
Paulos, E.3
White, R.4
-
21
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Proc. of Theory of Cryptography, pages 577–594, 2009.
-
(2009)
Proc. of Theory of Cryptography
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
23
-
-
35449007284
-
Preserving location privacy in wireless lans
-
New York, NY, USA, ACM
-
T. Jiang, H. J. Wang, and Y.-C. Hu. Preserving location privacy in wireless lans. In MobiSys’07: Proceedings of the 5th international conference on Mobile systems, applications and services, pages 246–257, New York, NY, USA, 2007. ACM.
-
(2007)
MobiSys’07: Proceedings of the 5th international conference on Mobile systems, applications and services
, pp. 246-257
-
-
Jiang, T.1
Wang, H. J.2
Hu, Y.-C.3
-
26
-
-
0345058962
-
Verifiable homomorphic oblivious transfer and private equality test
-
H. Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In Proc. of Asiacrypt, pages 416–433, 2003.
-
(2003)
Proc. of Asiacrypt
, pp. 416-433
-
-
Lipmaa, H.1
-
27
-
-
77954179758
-
Signal authentication: A secure civil gnss for today
-
October
-
S. Lo, D. D. Loenzo, P. Enge, and P. Bradley. Signal authentication: A secure civil gnss for today. Inside GNSS Magazine, 4(5), October 2009. www.insidegnss.com/node/1633.
-
(2009)
Inside GNSS Magazine
, vol.4
, Issue.5
-
-
Lo, S.1
Loenzo, D. D.2
Enge, P.3
Bradley, P.4
-
28
-
-
67650652709
-
We saw each other on the subway: secure, anonymous proximity-based missed connections
-
New York, NY, USA, ACM
-
J. Manweiler, R. Scudellari, Z. Cancio, and L. P. Cox. We saw each other on the subway: secure, anonymous proximity-based missed connections. In HotMobile’09: Proceedings of the 10th workshop on Mobile Computing Systems and Applications, pages 1–6, New York, NY, USA, 2009. ACM.
-
(2009)
HotMobile’09: Proceedings of the 10th workshop on Mobile Computing Systems and Applications
, pp. 1-6
-
-
Manweiler, J.1
Scudellari, R.2
Cancio, Z.3
Cox, L. P.4
-
35
-
-
84946418789
-
VPriv: Protecting Privacy in Location-Based Vehicular Services
-
Montreal, Canada, August
-
R. A. Popa, H. Balakrishnan, and A. Blumberg. VPriv: Protecting Privacy in Location-Based Vehicular Services. In 18th USENIX Security Symposium, Montreal, Canada, August 2009.
-
(2009)
18th USENIX Security Symposium
-
-
Popa, R. A.1
Balakrishnan, H.2
Blumberg, A.3
-
37
-
-
34547980841
-
Geoencryption using loran
-
D. Qiu, S. Lo, P. Enge, D. Boneh, and B. Peterson. Geoencryption using loran. In The Institute of Navigation International Technical Meeting, 2007.
-
(2007)
The Institute of Navigation International Technical Meeting
-
-
Qiu, D.1
Lo, S.2
Enge, P.3
Boneh, D.4
Peterson, B.5
-
38
-
-
69949157375
-
Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden?
-
R. Ravichandran, M. Benisch, P. G. Kelley, and N. M. Sadeh. Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden? In PETS, pages 1–18, 2009.
-
(2009)
PETS
, pp. 1-18
-
-
Ravichandran, R.1
Benisch, M.2
Kelley, P. G.3
Sadeh, N. M.4
-
40
-
-
84979822702
-
The tolls of privacy: An underestimated roadblock for electronic toll collection usage
-
P. F. Riley. The tolls of privacy: An underestimated roadblock for electronic toll collection usage. Computer Law and Security Report, 24(6):521 – 528, 2008.
-
(2008)
Computer Law and Security Report
, vol.24
, Issue.6
, pp. 521-528
-
-
Riley, P. F.1
-
42
-
-
84859788692
-
Stalkers Exploit Cellphone GPS
-
J. Scheck. Stalkers Exploit Cellphone GPS, 2010. Wall Street Journal.
-
(2010)
Wall Street Journal
-
-
Scheck, J.1
-
44
-
-
70450207983
-
Privately querying location-based services with sybilquery
-
Orlando, Florida, September/October ACM Press, New York, NY, USA
-
P. Shankar, V. Ganapathy, and L. Iftode. Privately querying location-based services with sybilquery. In UbiComp’09: Proceedings of the 11th International Conference on Ubiquitous Computing, pages 31–40, Orlando, Florida, September/October 2009. ACM Press, New York, NY, USA. http://doi.acm.org/10.1145/1620545.1620550.
-
(2009)
UbiComp’09: Proceedings of the 11th International Conference on Ubiquitous Computing
, pp. 31-40
-
-
Shankar, P.1
Ganapathy, V.2
Iftode, L.3
-
45
-
-
84898111360
-
FaceTrust: Assessing the Credibility of Online Personas via Social Networks
-
M. Sirivianos, K. Kim, and X. Yang. FaceTrust: Assessing the Credibility of Online Personas via Social Networks. In Usenix HotSec, 2009.
-
(2009)
Usenix HotSec
-
-
Sirivianos, M.1
Kim, K.2
Yang, X.3
-
47
-
-
70350371072
-
A location privacy aware friend locator
-
Springer-Verlag
-
L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In SSTD’09, pages 405–410. Springer-Verlag, 2009.
-
(2009)
SSTD’09
, pp. 405-410
-
-
Šikšnys, L.1
Thomsen, J. R.2
Šaltenis, S.3
Yiu, M. L.4
Andersen, O.5
-
50
-
-
32144446861
-
Security issues in a future vehicular network
-
M. E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian. Security issues in a future vehicular network. In In European Wireless, pages 270–274, 2002.
-
(2002)
European Wireless
, pp. 270-274
-
-
Zarki, M. E.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
51
-
-
38149079700
-
Louis, Lester and Pierre: Three protocols for location privacy
-
G. Zhong, I. Goldberg, and U. Hengartner. Louis, Lester and Pierre: Three protocols for location privacy. In Privacy Enhancing Technologies, pages 62–76, 2007.
-
(2007)
Privacy Enhancing Technologies
, pp. 62-76
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
|