2015 7th International Conference on Communication Systems and Networks (COMSNETS) 2015
DOI: 10.1109/comsnets.2015.7098697
|View full text |Cite
|
Sign up to set email alerts
|

Social power for privacy protected opportunistic networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…B. Distl and S. Neuhaus [84] proposed a mechanism based on the Bloom filter that uses social connections (preestablished social links) to improve performance without revealing users' private information. The algorithm detects social links, uses them for mutual authentication while protecting personal information.…”
Section: Oppnets Privacy Protection Schemesmentioning
confidence: 99%
“…B. Distl and S. Neuhaus [84] proposed a mechanism based on the Bloom filter that uses social connections (preestablished social links) to improve performance without revealing users' private information. The algorithm detects social links, uses them for mutual authentication while protecting personal information.…”
Section: Oppnets Privacy Protection Schemesmentioning
confidence: 99%
“…In this paper, we focus on social relationship measurement and the efficient routing schemes, which may have security and privacy problems. Recently, a number of solutions [ 22 , 23 , 24 , 25 , 26 ] have been proposed to deal with the security and privacy issues in information exchange between nodes in MONs. The solutions to the privacy and security problems in the proposed scheme can refer to the related works mentioned above.…”
Section: Social Relationship Measurementmentioning
confidence: 99%
“…FindU [28] offers interest matching among co-located devices and uses secure multi-party computation (SMC) to ensure that only the profile of the best matching nearby user is revealed. Dong et al [18] and Distl et al [17] also address privacy-preserving profile matching. Privacypreserving attribute matching can be built on top of enClosure, but remains as future work.…”
Section: Introductionmentioning
confidence: 99%