Author of the publication

Fully Anonymous Profile Matching in Mobile Social Networks.

, , , , , and . IEEE Journal on Selected Areas in Communications, 31 (9-Supplement): 641-655 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computers, productive agency, and the effort after shared meaning., and . J. Computing in Higher Education, 12 (2): 3-33 (2001)REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks., , , and . Computer Networks, 54 (15): 2744-2755 (2010)HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks., , , , and . Computer Communications, 35 (15): 1910-1920 (2012)EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid., , , , , and . IEEE Trans. Parallel Distrib. Syst., 25 (8): 2053-2064 (2014)Security and Privacy in Mobile Social Networks., , , and . Springer Briefs in Computer Science Springer, (2013)CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks.. GLOBECOM, page 1-6. IEEE, (2009)An Efficient and Secure User Revocation Scheme in Mobile Social Networks., , , , and . GLOBECOM, page 1-5. IEEE, (2011)Selectively iterative particle filtering and its applications for target tracking in WSNs., , , and . GLOBECOM, page 504-509. IEEE, (2013)Detecting GPS information leakage in Android applications., , , , , , and . GLOBECOM, page 826-831. IEEE, (2013)Cooperative sensing scheduling in Cognitive Radio Networks with multiple Primary Networks., and . GLOBECOM, page 822-827. IEEE, (2014)