A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure friend discovery in mobile social networks
2011
2011 Proceedings IEEE INFOCOM
To address these concerns, in this paper we develop novel techniques and protocols to compute social proximity between two users to discover potential friends, which is an essential task for mobile social ...
Second, we develop a novel solution for secure proximity estimation, which allows users to identify potential friends by computing social proximity in a privacy-preserving manner. ...
To address the challenge, we develop novel techniques and protocols for computing proximity in a privacy-preserving, verifiable, and efficient manner. ...
doi:10.1109/infcom.2011.5934958
dblp:conf/infocom/DongDQZ11
fatcat:w2otung3cfhxrhsjd5s2ouqrgm
Secured Friending in Proximity based Mobile Social Network
2015
Journal of excellence in Computer Science and Engineering
In recent days there is a tremendous rise in the need of proximity based mobile social networks. ...
Evaluation using real data and actual implementation shows that this mechanism improves security and is privacy preserving, verifiable and efficient. ...
Proximity based mobile social network refers to the interaction among people in the nearby proximity within a WIFI or bluetooth connection. ...
doi:10.18831/djcse.in/2015021001
fatcat:s6zpfp7emjfw5ncbabv4mstape
For your phone only: custom protocols for efficient secure function evaluation on mobile devices
2013
Security and Communication Networks
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining ...
Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to ...
Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. ...
doi:10.1002/sec.851
fatcat:vn2ueq6kzvgojj7zdbckamcxuy
Do I know you?
2013
Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13
., to enforce access control based on users' social proximity in a privacy-preserving manner. ...
The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. ...
, and Mark Manulis and Bertram Poettering for their fruitful collaboration. ...
doi:10.1145/2523649.2523668
dblp:conf/acsac/NagyCDAS13
fatcat:5uijn5tk2vcpfmccvxdzrai56e
Efficient Revocation of Untrusted User in Identity based Cloud Storage System for Shared Big Data
2019
International Journal for Research in Applied Science and Engineering Technology
This is achieved by generating a key and a new private key update technique. ...
Using this technique, user revocation is realized by just updating the non-revoked group users' private keys rather than authenticators of the revoked user. ...
CONCLUSION In this study , we propose an identity-based cloud storage auditing scheme for shared data, which supports real efficient user revocation. ...
doi:10.22214/ijraset.2019.6255
fatcat:ro5kqizrfrb5jgpmfj5wxbkud4
Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks
2022
International Journal of Computer Networks And Applications
(Ho-En) technique for multiple recipients. ...
Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. ...
[26] presented a Verifiable Private Interactive technique to achieve Fine-grained PM (VPI-FPM). ...
doi:10.22247/ijcna/2022/214506
fatcat:3wgvf3kghba75g37k5t7ktbgly
Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
2013
2013 IEEE 33rd International Conference on Distributed Computing Systems
Many proximity-based mobile social networks are developed to facilitate connections between any two people, or to help a user to find people with a matched profile within a certain distance. ...
Extensive evaluations using real social network data, and actual system implementation on smart phones show that our mechanisms are significantly more efficient than existing solutions. ...
The second category measures the social proximity by private vector dot product [7] , [9] , [25] . ...
doi:10.1109/icdcs.2013.38
dblp:conf/icdcs/ZhangLL13
fatcat:4mmycpnvnbeu7pk2yh6vbyw6gu
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks
2015
IEEE Transactions on Mobile Computing
Many proximity-based mobile social networks are developed to facilitate connections between any two people, or to help a user to find people with a matched profile within a certain distance. ...
Extensive evaluations using real social network data, and actual system implementation on smart phones show that our mechanisms are significantly more efficient than existing solutions. ...
The second category considers a user's profile as a vector and measures the social proximity by private vector dot product [6] , [10] , [35] . ...
doi:10.1109/tmc.2014.2366773
fatcat:dxfkhvg76vcbfhvwr6z2xbtbla
Private discovery of common social contacts
2012
International Journal of Information Security
One common problem occurs when two unfamiliar users, in the process of establishing social relationships, want to assess their social proximity by discovering mutual contacts. ...
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. ...
Introduction The increasing volume of electronic social interactions motivates the need for efficient privacyenhancing techniques. ...
doi:10.1007/s10207-012-0183-4
fatcat:qrlzg5vi55avbpgsa3g24ejbiu
Private Discovery of Common Social Contacts
[chapter]
2011
Lecture Notes in Computer Science
One common problem occurs when two unfamiliar users, in the process of establishing social relationships, want to assess their social proximity by discovering mutual contacts. ...
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. ...
Introduction The increasing volume of electronic social interactions motivates the need for efficient privacyenhancing techniques. ...
doi:10.1007/978-3-642-21554-4_9
fatcat:bm3cxktzfzf7lllb7ntcn6ui24
A Survey on User's Location Detail Privacy-Preserving Models
2020
SN Computer Science
When users want to use social networks, they worry about preserving their privacy. Users normally prefer to maintain their location secure and safe in social networks for many privacy reasons. ...
In this paper, we present different techniques that are used to protect location privacy of the users. Also it helps us to select an appropriate technique to protect location information of the user. ...
This article is part of the topical collection "Advances in Computational Approaches for Artificial Intelligence, Image Processing, IoT and Cloud Applications" guest edited by Bhanu Prakash K N and M. ...
doi:10.1007/s42979-020-00178-z
fatcat:lb35kpnyfngdjhcelbo6uwfhcq
Towards Secure and Practical Location Privacy through Private Equality Testing
[chapter]
2014
Lecture Notes in Computer Science
In this paper we deal with private proximity testing in social LBS queries (i.e., Buddy-finder SNSs). ...
Finally, we describe how we could use our primitive as a building block for a proximity testing buddy-finder service for social networks. ...
The authors would like to thank Constantinos Patsakis for indicating an attack in an early version of the PET protocol. ...
doi:10.1007/978-3-319-11257-2_24
fatcat:eyifeqlxjfchpp23pibe346jvq
Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
2013
IEEE Transactions on Emerging Topics in Computing
Mobile social networks represent a promising cyber-physical system, which connects mobile nodes within a local physical proximity using mobile smart phones as well as wireless communication. ...
The detailed security analysis as well as real-world implementations demonstrate the effectiveness and efficiency of the proposed protocol. ...
Further, to thwart runaway attack, we introduce a lightweight verifier checking technique, which enables the verifier to check the matching at the minimized overhead and prevent any participant from launching ...
doi:10.1109/tetc.2013.2279541
fatcat:evrab3jg25h3hfh5f3yd2fus2q
Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks
2015
International Journal of Security and Its Applications
The major impediments that mostly arise in matchmaking in mobile social networks are ensuring the privacy of users' attributes, finding the intersection of attributes of the matched-pair without revealing ...
The increasing dependence on anytime-anywhere availability of information and the commensurate increasing fear of losing privacy motivate the need for privacy-preserving techniques in mobile social networks ...
The main contribution of this research is to formulate a novel hybrid proximity-based matchmaking protocol that is privacypreserving, efficient and secure against malicious attacks. ...
doi:10.14257/ijsia.2015.9.5.22
fatcat:uhohipwixvghxm7vwslccxzgse
Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
[article]
2012
arXiv
pre-print
Our rigorous analysis shows that our mechanism is secure, privacy-preserving, verifiable, and efficient both in communication and computation. ...
Many proximity-based mobile social networks are developed to facilitate connections between any two people, or to help a user to find people with matched profile within a certain distance. ...
And there lack efficient methods to verify the result. ...
arXiv:1207.7199v1
fatcat:t3pharzujvhkhlphlycs36lp2i
« Previous
Showing results 1 — 15 out of 28,967 results