Social-aware stateless routingin pocket switched networks

A Mei, G Morabito, P Santi… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Existing social-aware routing protocols for packet switched networks make use of the
information about the social structure of the network deduced by state information of nodes …

{Ad-Hoc} secure {Two-Party} computation on mobile devices using hardware tokens

D Demmler, T Schneider, M Zohner - 23rd USENIX Security Symposium …, 2014 - usenix.org
Secure two-party computation allows two mutually distrusting parties to jointly compute an
arbitrary function on their private inputs without revealing anything but the result. An …

PSaD: A privacy-preserving social-assisted content dissemination scheme in DTNs

L Guo, C Zhang, H Yue, Y Fang - IEEE Transactions on Mobile …, 2014 - ieeexplore.ieee.org
Content dissemination is very useful for many mobile applications, like instant messaging,
file sharing, and advertisement broadcast, etc. In real life, for various kinds of time …

Understanding soft skills requirements for mobile applications developers

J Jia, Z Chen, X Du - … Science and Engineering (CSE) and IEEE …, 2017 - ieeexplore.ieee.org
The development of smart phone software industry has brought high demands for mobile
developers. The skills of developers have a great influence on the quality of software …

Investigating the privacy versus forwarding accuracy tradeoff in opportunisticinterest-casting

G Costantino, F Martinelli, P Santi - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Many mobile social networking applications are based on a “friend proximity detection” step,
according to which two mobile users try to jointly estimate whether they have friends in …

Application of Secure Two-Party Computation in a Privacy-Preserving Android App

M De Vincenzi, I Matteucci, F Martinelli… - Proceedings of the 18th …, 2023 - dl.acm.org
Data privacy has become increasingly important in recent years, with the rise of cyber
threats and the unauthorized sharing of sensitive information. Our work within the E-Corridor …

Overview on privacy-preserving profile-matching mechanisms in mobile social networks in proximity (MSNP)

Y Wang, J Xu - 2014 Ninth Asia Joint Conference on …, 2014 - ieeexplore.ieee.org
Recently, mobile social networking in proximity (MSNP) has gained tremendous attentions,
which refers to the social interactions among physically proximate mobile users directly …

Losero: A locality sensitive routing protocol in opportunistic networks with contact profiles

G Costantino, RR Maiti, F Martinelli… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobility trajectories of users contain personal information that when analyzed may reveal
relevant data usable as message-sharing condition, eg, interests in common or similar …

Privacy preserving distributed attribute computation for usage control in the internet of things

G Costantino, A La Marra, F Martinelli… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
The distributiveness of Internet of Things (IoT) applications, introduces the requirement of a
decentralized control system able to enforce security, safety and management policies …

Privacy-preserving energy-reading for smart meter

G Costantino, F Martinelli - Inclusive Smart Cities and e-Health: 13th …, 2015 - Springer
Smart Meters belong to the Advanced Metering Infrastructure (AMI) and allow customers to
monitor locally and remotely the current usage of energy. Providers query Smart Meters for …