Back to Results
First PageMeta Content
Online chat / Cryptographic protocols / Public-key cryptography / Secure multi-party computation / Internet privacy / Social software / Internet / Email / Privacy / Cryptography / Technology / Computing


1 Secure Friend Discovery in Mobile Social Networks Wei Dong Vacha Dave Lili Qiu Yin Zhang The University of Texas at Austin
Add to Reading List

Document Date: 2011-03-04 13:47:50


Open Document

File Size: 231,74 KB

Share Result on Facebook

City

C OORDINATE / /

Company

Virgin Mobile / Netflix / Motorola / Twitter / Facebook / Myspace / LinkedIn / Nokia / YouTube / LiveJournal / HP / Microsoft / /

Currency

USD / pence / /

/

Facility

Mobile Social Networks Wei Dong Vacha Dave Lili Qiu Yin Zhang The University of Texas / /

IndustryTerm

extra dot product / protocols product protocol / verifiable secure dot product protocol / secure protocols / graph mining / given social network / inner product / social networking site / ad-hoc networks / online system / online social networks / secure friend discovery protocol / dot product / secure dot product / wireless medium / wireless privacy / private dot product computation protocols / Internet statistics / mobile social networking / above protocol / location-based services / real dot product / secure proximity computation protocol / binary search attack / proximity pre-filtering protocol / binary search attacks / slower processor / secure dot product protocols / link layer protocol / social networking / server-based solution / association mining / social networks / mobile social networks / trusted central server / social network applications / Internet server / dot products / dot product protocol / social networking apps / Privacy preserving association rule mining / large social networks / secure dot product protocol / verifiable secure dot product protocols / identifier-free link layer protocol / techniques and protocols / Privacy-preserving dot product protocols / huge online social networking services / secure and practical protocols / dot-products / wireless networks / pre-filtering protocol / mobile online social networks / distributed range query computing / proximity embedding algorithm / social software / privacy-preserving data mining / secure protocol / binary search / negative dot product / desired dot product / social network / consumer networks / light-weight protocol / secure proximity computation protocols / homomorphic protocol / supported wireless ad-hoc mode / mobile social network / online social network / Wireless network privacy / /

OperatingSystem

Windows Vista / Windows Mobile / Android / DoS / /

Organization

University of Texas at Austin / IMC / National Science Foundation / ON PC / /

Person

Dave Lili Qiu Yin Zhang / Bob / T. W. Cho / V / Wei Dong Vacha Dave Lili Qiu / Alice / Max Min / /

Position

HB / centralized trusted broker / /

Product

iphone / HP iPAQ Headphone/Headset / new .NET / Motorola Droid Smartphone / Apple iPhone 3G Smartphone / /

ProgrammingLanguage

Java / php / /

RadioStation

Katz / /

Technology

verifiable secure dot product protocol / Privacy-preserving dot product protocols / secure dot product protocols / above protocol / identifier-free link layer protocol / Encryption-based protocols / existing homomorphic protocol / VERIFIABLE SECURE DOT PRODUCT PROTOCOLS / two protocols product protocol / mobile phones / two protocols / operating system / html / slower processor / Encryption / private dot product computation protocols / two secure dot product protocols / proximity embedding algorithm / cryptography / secure friend discovery protocol / Java / using Protocol / 550 MHz Arm Cortex A8 processor / homomorphic protocol / 1 Protocol / digital signature / secure protocol / Section IV-C. Homomorphic dot product protocol / 3G / proximity pre-filtering protocol / LAN / broadband / light-weight protocol / smartphone / Homomorphic encryption / Private key / secure proximity computation protocol / Android / P8600 processor / cellular telephone / pre-filtering protocol / 416 MHz Processor / public key / smartphones / 802.11like link layer protocol / http / data mining / secure dot product protocol / one secure dot product protocol / /

URL

www.associatedcontent.com/article/1764228/top / http /

SocialTag