[1] |
LU R , LIN X , LIANG X ,et al. A secure handshake scheme with symptoms-matching for healthcare social network[J]. Mobile Networks & Applications—Special Issue on Wireless & Personal Comm, 2011,16(6): 683-694.
|
[2] |
SUN J , ZHANG R , ZHANG Y . Privacy-preserving spatiotemporal matching[A]. Proceedings of the 32nd IEEE International Conference on Computer Communications[C]. Turin,Italy, 2013. 800-808.
|
[3] |
LI M , CAO N , YU S ,et al. FindU:privacy-preserving personal profile matching in mobile social networks[A]. Proceedings of the 30th IEEE International Conference on Computer Communications[C]. Shanghai,China, 2011. 2435-2443.
|
[4] |
YANG Z , ZHANG B , DAI J ,et al. E-SmallTalker:a distributed mobile system for social networking in physical proximity[A]. Proceedings of the IEEE 30th International Conference on Distributed Computing Systems[C]. Genoa,Italy, 2010. 468-477.
|
[5] |
BLOOM B H . Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970,13(7): 422-426.
|
[6] |
LU R , LIU X , SHEN X . SPOC:a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,24(3): 614-624.
|
[7] |
FREEDMAN M J , NISSIM K , PINKAS B . Efficient private matching and set intersection[A]. Advances in Cryptology - EUROCRYPT 2004[C]. Springer Berlin Heidelberg, 2004. 1-19.
|
[8] |
KISSNER L , SONG D . Privacy-preserving set operations[A]. Advances in Cryptology – CRYPTO 2005[C]. Springer Berlin Heidelberg, 2005. 241-257.
|
[9] |
DONG C , CHEN L , WEN Z . When private set intersection meets big data:an efficient and scalable protocol[A]. Proceedings of the 21st ACM Conference on Computer and Communications Security[C]. Scottsdale,USA, 2013. 789-800.
|
[10] |
HAZAY C , NISSIM K . Efficient set operations in the presence of malicious adversaries[A]. Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography[C]. Paris,France, 2010. 383-433.
|
[11] |
JARECKI S , LIU X . Fast secure computation of set intersection[A]. Proceedings of the 7th International Conference on Security and Cryptography for Networks[C]. Amalfi,Italy, 2010. 418-435.
|
[12] |
CRISTOFARO E D , TSUDIK G . Practical private set intersection protocols with linear complexity[A]. Proceedings of the 14th International Conference on Financial Cryptography and Data Security[C]. Tenerife,Spain, 2010. 143-159.
|
[13] |
CRISTOFARO E D , KIM G , TSUDIK G . Linear-complexity private set intersection protocols secure in malicious model[A]. Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security[C]. Singapore,Singapore, 2010. 213-231.
|
[14] |
KERSCHBAUM F . Outsourced private set intersection using homomorphicencryption[A]. Proceedings of the Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security[C]. Seoul,Korea, 2012. 85-86.
|
[15] |
AGRAWAL R , EVFIMIEVSKI A , SRIKANT R . Information sharing across private databases[A]. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data[C]. San Diego,USA, 2003. 86-97.
|
[16] |
VAIDYA J , CLIFTON C . Secure set intersection cardinality with application to association rule mining[J]. Journal of Computer Security, 2002,1(13): 593-622.
|
[17] |
VON M,BADER A M , KUHN M , WATTENHOFER R . Veneta:serverless friend-of-friend detection in mobile social networking[A]. Proceedings of the 2008 IEEE International Conference on Wireless &Mobile Computing,Networking & Communication[C]. Avignon,France, 2008. 184-189.
|
[18] |
ZHANG R , ZHANG Y , SUN J ,et al. Fine-grained private matching for proximity-based mobile social networking[A]. Proceedings of the 31st IEEE International Conference on Computer Communications[C]. Orlando,USA, 2012. 1969-1977.
|
[19] |
NIU B , LI X , ZHU X ,et al. Are you really my friend? Exactly spatiotemporal matching scheme in privacy-aware mobile social networks[A]. Proceedings of the 10th International Conference on Security and Privacy in Communication Networks[C]. Beijing,China, 2014.
|
[20] |
NIU B,HE Y , LI F H , LI H . Achieving secure friend discovery in social strength-aware PMSNs[A]. Proceedings of the the 34th Anniversary of the Premier International Conference for Military Communications[C]. Florida,USA, 2015.
|
[21] |
NIU B , ZHU X , LIU J ,et al. Weight-aware private matching scheme for Proximity-based mobile social networks[A]. Proceedings of the IEEE 2003 Global Communications Conference[C]. Atlanta,USA, 2013. 3170-3175.
|
[22] |
FU Y , WANG Y . BCE:a privacy-preserving common-friend estimation method for distributed online social networks without cryptography[A]. Proceedings of the 7th International Conference on Communications and Networking in China[C]. Kunming,China, 2012. 212-217.
|
[23] |
MANY D , BURKHART M , DIMITROPOULOS X . Fast private set Operations with SEPIA[EB/OL]. .
|
[24] |
POSE P , GUO H,KRANAKISE . On the false-positive rate of bloom filters[J]. Information Processing Letters, 2008,108(4): 210-213.
|
[25] |
NIUB , ZHU X , ZHANG T . P-match:priority-aware friend discovery for proximity-based mobile social networks[A]. Proceedings of the10th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems[C]. Hangzhou,China, 2013. 351-355.
|
[26] |
CHEN Z , ZHU B . Some formal analysis of rocchio’s similarity-based relevance feedback algorithm[J]. Algorithms and Computation, 2000,19(69): 108-119.
|
[27] |
PAPAPERTROU W , SIBERSKI W . Cardinality estimation and dynamic length adaptation for bloom filters[J]. Distributed & Parallel Databases, 2010,28(2-3): 119-156(38).
|