Proceedings of the First ACM Conference on Data and Application Security and Privacy 2011
DOI: 10.1145/1943513.1943549
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving activity scheduling on mobile devices

Abstract: Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users' personal schedules. Users also access popular context-based services, typically provided by third-party providers, by using these devices for social networking, dating and activitypartner searching applications. Very often, these applications need to determine common availabilities among a set of user schedules. The privacy of the scheduling operation is paramount to the success of such applica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Besides the literature mentioned above, there are other related schemes on privacy preserving data aggregation in various application settings: Ács et al [1], Chan et al [8] and Kursawe et al [12] provide schemes for usage in the context of smart metering. Furthermore, De Cristofaro and Soriente [9] and Shi et al [16] give a constructions for participatory sensing applications and Bilogrevic et al [4] and Bilogrevic et al [3] offer appointment scheduling schemes, but none of them can deal with verifiability. Moreover, in [9] and [16] the decryption is done separately from the data aggregation (just as in [4] and [3]) and there are intermediary actors between the data-providers and the data aggregator, which is often rather impractical.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides the literature mentioned above, there are other related schemes on privacy preserving data aggregation in various application settings: Ács et al [1], Chan et al [8] and Kursawe et al [12] provide schemes for usage in the context of smart metering. Furthermore, De Cristofaro and Soriente [9] and Shi et al [16] give a constructions for participatory sensing applications and Bilogrevic et al [4] and Bilogrevic et al [3] offer appointment scheduling schemes, but none of them can deal with verifiability. Moreover, in [9] and [16] the decryption is done separately from the data aggregation (just as in [4] and [3]) and there are intermediary actors between the data-providers and the data aggregator, which is often rather impractical.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, De Cristofaro and Soriente [9] and Shi et al [16] give a constructions for participatory sensing applications and Bilogrevic et al [4] and Bilogrevic et al [3] offer appointment scheduling schemes, but none of them can deal with verifiability. Moreover, in [9] and [16] the decryption is done separately from the data aggregation (just as in [4] and [3]) and there are intermediary actors between the data-providers and the data aggregator, which is often rather impractical.…”
Section: Introductionmentioning
confidence: 99%