LI M, CAO N, Yu S, et al. Findu: privacy-preserving personal profile matching in mobile social networks[C]. Proceedings of INFOCOM, Shanghai, China, 2011: 2435-2443. doi: 10.1109 /INFCOM.2011.5935065.
|
ZHANG Rui, ZHANG Jinxue, Zhang Yanchao, et al. Privacy- preserving profile matching for proximity-based mobile social networking[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 656-668. doi: 10.1109/JSAC. 2013.SUP.0513057.[2]
|
JIANG W, WU J, WANG G, et al. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics[J]. IEEE Transactions on Computers, 2016: 65(4): 1211-1224. doi: 10.1109/TC.2015.2446842.
|
WEI D, VACHA D, ZHANG Y, et al. Secure friend discovery in mobile social networks[C]. Proceedings of INFOCOM, Shanghai, China, 2011: 1647-1655. doi: 10.1109/INFCOM. 2011.5934958.
|
NIU B, ZHU X, LIU J, et al. Weight-aware private matching scheme for proximity-based mobile social networks[C]. IEEE Global Communications Conference Exhibition Industry Forum, Atlanta, USA, 2013: 3170-3175. doi: 10.1109/ GLOCOM.2013.6831559.
|
ZHANG Lan, LI Xiangyang, LIU Kebin, et al. Message in a sealed bottle: privacy preserving friending in mobile social networks[J]. IEEE Transactions on Mobile Computing, 2015, 14(9): 1888-1902. doi: 10.1109/TMC.2014.2366773.
|
ZHU X, LIU J, JIANG S, et al. Efficient weight-based private matching for proximity-based mobile social networks[C]. 2014 IEEE International Conference on Communications, Sydney, Australia, 2014: 4114-4119. doi: 10.1109/ICC.2014.6883965.
|
CAO Ning, WANG Cong, Li Ming, et al. Privacy- preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(1): 222-233. doi: 10.1109/TPDS.2013.45.
|
GUO Linke, ZHANG Chi, and SUN Jinyuan. A privacy-preserving attribute-based authentication system for mobile health networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(9): 1927-1941. doi: 10.1109/TMC. 2013.84.
|
ZHU Haojin, DU Suguo, LI Muyuan, et al. Fairness-aware and privacy-preserving friend matching protocol in mobile social networks[J]. IEEE Transactions on Emerging Topics in Computing, 2013, 1(1): 192-200. doi: 10.1109/TETC.2013. 2279541.
|
霍峥, 孟小峰, 黄毅. PrivateCheckIn: 一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013, 36(4): 716-726. doi: 10.3724/SP.J.1016.2013.00716.
|
HUO Zheng, MENG Xiaofeng, and HUANG Yi. Private CheckIn: Trajectory privacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013, 36(4): 716-726. doi: 10.3724/SP.J.1016.2013.00716.
|
KANTARCIOGLU M and CLIFTON C. Privacy-preserving distributed mining of association rules on horizontally partitioned data[J]. IEEE Transactions on Knowledge Data Engineering, 2004, 16(9): 1026-1037. doi: 10.1109/TKDE. 2004.45.
|
CHOW S M, He Y J, Hui L C K, et al. Spicesimple privacy-preserving identity-management for cloud environment[C]. Applied Cryptography and Network Security, Berlin Heidelberg, Germany, 2012: 526-543. [13] doi: 10.1007/ 978-3-642-31284-7_31.
|
LINDELL Y and PINKAS B. An efficient protocol for secure two-party computation in the presence of malicious adversaries[J]. Journal of Cryptology, 2015, 28(2): 312-350. doi: 10.1007/s00145-014-9177-x.
|
HAZAY C and TOFT T. Computationally secure pattern matching in the presence of malicious adversaries[J]. Journal of Cryptology, 2014, 27(2): 358-395. doi: 10.1007/s00145- 013-9147-8.
|
张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签名方案[J]. 电子与信息学报, 2015, 37(12): 2838-2843. doi: 10.11999/JEIT150407.
|
ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2843. doi: 10.11999/JEIT150407.
|
FREEDMAN M J, NISSIM K, and PINKAS B. Efficient private matching and set intersection[C]. Advances in Cryptology- EUROCRYPT, Berlin Heidelberg, Germany, 2004: 1-19. doi: 10.1007/978-3-540-24676-3_1.
|
LUO Entao, LIU Qin, and WANG Guojun. NMHP: a privacy preserving profile matching protocol in multi-hop proximity mobile social networks[C]. International Conference on Algorithms and Architectures for Parallel Processing, Zhangjiajie, China, 2015: 463-474. doi: 10.1007/978-3-319- 27137-8_34.
|