2014
DOI: 10.1504/ijics.2014.066650
|View full text |Cite
|
Sign up to set email alerts
|

SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The EPSA scheme uses the short signatures technique and the public key encryption with keyword search for ensuring content oriented privacy. There are also other works related to the content oriented privacy models, such as the impersonator resistance [27], [17] and the trust evaluation [14], [30].…”
Section: G Content Oriented Privacymentioning
confidence: 99%
See 4 more Smart Citations
“…The EPSA scheme uses the short signatures technique and the public key encryption with keyword search for ensuring content oriented privacy. There are also other works related to the content oriented privacy models, such as the impersonator resistance [27], [17] and the trust evaluation [14], [30].…”
Section: G Content Oriented Privacymentioning
confidence: 99%
“…Homomorphic encryption [72] is used by three schemes [37], [17] [41]. Rothblum in [98] considers homomorphic encryption as a public-key scheme.…”
Section: Traceability Gamementioning
confidence: 99%
See 3 more Smart Citations