- “Comscore,”http://www.comscoredatamine.com/.
- A. G. Miklas, K. K. Gollu, K. K. W. Chan, S. Saroiu, P. K. Gummadi, and E. de Lara, “Exploiting social interactions in mobile systems,” inUbicomp, 2007, pp. 409–428.
- S. Ioannidis, A. Chaintreau, and L. Massoulie, “Optimal and scalable distribution of content updates over a mobile social network,” in Proc. IEEEINFOCOM, 2009, pp. 1422–1430.
- R. Lu, X. Lin, and X. Shen, “Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks,” inProc. IEEE INFOCOM, 2010, pp. 632–640.
- W. He, Y. Huang, K. Nahrstedt, and B. Wu, “Message propagation in adhoc-basedproximity mobile social networks,” in PERCOM workshops, 2010, pp. 141–146.
- D. Niyato, P. Wang, W. Saad, and A. Hjørungnes, “Controlled coalitional games for cooperative mobile social networks,” IEEE Transactions onVehicular Technology, vol. 60, no. 4, pp. 1812–1824, 2011.
- M. Motani, V. Srinivasan, and P. Nuggehalli, “Peoplenet: engineering a wireless virtual social network,” in MobiCom, 2005, pp. 243–257.
- M. Brereton, P. Roe, M. Foth, J. M. Bunker, and L. Buys, “Designing participation in agile ridesharing with mobile social software,” in OZCHI,2009, pp. 257–260.
- E.Bulut and B.Szymanski, “Exploiting friendship relations for efficient routing in delay tolerant mobile social networks,” IEEE Transactions onParallel and Distributed Systems, vol. 23, no. 12, pp. 2254–2265, 2012.
- Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E-smalltalker: A distributed mobile system for social networking in physicalproximity,” in ICDCS, 2010, pp. 468–477.
- Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay tolerantnetworks,” in Proc. IEEE INFOCOM, 2010, pp. 857–865.
- X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, “Moralitydriven data forwarding with privacy preservation in mobile social networks,”IEEE Transactions on Vehicular Technology, vol. 7, no. 61, pp. 3209–3222, 2012.
- R. Gross, A. Acquisti, and H. J. H. III, “Information revelation and privacy in online social networks,” in WPES, 2005, pp. 71–80.
- F. Stutzman, “An evaluation of identity-sharing behavior in social network communities.” iDMAa Journal, vol. 3, no. 1, pp. 10–18, 2006.
- K. P. N. Puttaswamy, A. Sala, and B. Y. Zhao, “Starclique: guaranteeing user privacy in social networks against intersection attacks,” inCoNEXT, 2009, pp. 157–168.
- E. Zheleva and L. Getoor, “To join or not to join: the illusion of privacy in social networks with mixed public and priv ate user profiles,” inWWW, 2009, pp. 531–540.
- G. Chen and F. Rahman, “Analyzing privacy designs of mobile social networking applications,” IEEE/IFIP International Conference onEmbedded and Ubiquitous Computing, vol. 2, pp. 83–88, 2008.
- D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon, and H.C. Wong, “Secret handshakes from pairing-based key agreements,” inIEEE Symposium on Security and Privacy, 2003, pp. 180–196.
- M. J. Freedman, K. Nissim, and B. Pinkas, “Efficient private matching and set intersection,” in EUROCRYPT, 2004, pp. 1–19.
- R. Lu, X. Lin, X. Liang, and X. Shen, “A secure handshake scheme with symptoms-matching for mhealthcare social network,” ACM MobileNetworks and Applications (MONET), vol. 16, no. 6, pp. 683–694, 2011.
- M. Li, N. Cao, S. Yu, and W. Lou, “Findu: Privacy-preserving personal profile matching in mobile social networks,” in Proc. IEEE INFOCOM,2011, pp. 2435–2443.
- R. Zhang, Y. Zhang, J. Sun, and G. Yan, “Fine-grained private matching for proximity-based mobile social networking,” in Proc. IEEEINFOCOM, 2012, pp. 1969–1977.
- W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure friend discovery inmobile social networks,” in Proc. IEEE INFOCOM, 2011, pp. 1647–1655.
- J. Freudiger, M. H. Manshaei, J.-P. Hubaux, and D. C. Parkes, “On noncooperative location privacy: a game-theoretic analysis,” in ACM CCS,2009, pp. 324–337.
- R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, “Pseudonym changing at social spots: An effective strategy for location privacy in vanets,” IEEETransactions on Vehicular Technology, vol. 61, no. 1, pp. 86 – 96, 2011.
- J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner product s,” in EUROCRYPT,2008, pp. 146–162.
- N. Eagle and A. Pentland, “Social serendipity: mobilizing social software,” IEEE Pervasive Computing, vol. 4, no. 2, pp. 28–34, 2005.
- J. Teng, B. Zhang, X. Li, X. Bai, and D. Xuan, “E-shadow: Lubricating social interaction using mobile phones,” in ICDCS, 2011, pp. 909–918.
- B. Han and A. Srinivasan, “Your friends have more friends than you do: identifying influential mobile users through random walks,” inMobiHoc, 2012, pp. 5–14.
- Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E-smalltalker: A distributed mobile system for social networking in physicalproximity,” in ICDCS, 2010, pp. 468–477.
- L. Kissner and D. X. Song, “Privacy-preserving set operations,” in CRYPTO, 2005, pp. 241–257.
- Q. Ye, H. Wang, and J. Pieprzyk, “Distributed private matching and set operations,” in ISPEC, 2008, pp. 347–360.
- D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung, “Efficient robust private set intersection,” in ACNS, 2009, pp. 125–142.
- S. Jarecki and X. Liu, “Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection,”in TCC, 2009, pp. 577–594.
- C. Hazay and Y. Lindell, “Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries,”Journal of Cryptology, vol. 23, no. 3, pp. 422–456, 2010.
- B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, “On private scalar product computation for privacy-preserving data mining,” in ICISC,2004, pp. 104–120. 2004, pp. 104–120.
- A. C.-C. Yao, “Protocols for secure computations (extended abstract),” in FOCS, 1982, pp. 160–164.
- O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game or a completeness theorem for protocols with honest majority,” inSTOC, 1987, pp. 218–229.
- Ioannidis, A. Grama, and M. J. Atallah, “A secure protocol for computing dot-products in clustered and distributed environments,” in ICPP, 2002,pp. 379–384.
- I. F. Blake and V. Kolesnikov, “Strong conditional oblivious transfer and computing on intervals,” in ASIACRYPT, 2004, pp. 515–529.
- P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in EUROCRYPT, 1999, pp. 223–238.
- M. Naehrig, K. Lauter, and V. Vaikuntanathan, “Can homomorphic encryption be practical?” in CCSW, 2011, pp. 113–124.
- R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “Eppa: An efficient and privacy-preserving aggregation scheme for secure smart gridcommunications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012.
- H. Ltkepohl, New introduction to multiple time series analysis. Springer, 2005.
- X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, “Exploiting prediction to enable secure and reliable routing in wireless bodyarea networks,” in Proc. IEEE INFOCOM, 2012, pp. 388–396.
- A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
- L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,vol. 10, no. 5, pp. 557–570, 2002.
- J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, “CRAWDAD trace cambridge/haggle/imote/infocom (v. 2006-01-31),” Jan.2006.
- D. J. Watts, “Small worlds: The dynamics of networks between order and randomness,” J. Artificial Societies and Social Simulation, vol. 6, no.2, 2003.
- C. Bron and J. Kerbosch, “Finding all cliques of an undirected graph (algorithm 457),” Communications of the ACM, vol. 16, no. 9, pp. 575–576, 1973.
|