Social network has extended its popularity from the Internet to mobile domain. Pervasive social networking (PSN) supports instant social activities based on self-organized mobile ad hoc networks. PSN is useful in reality when fixed networks are unavailable or inconvenient to access or when people are in vicinity. For supporting crucial PSN activities and enhancing user privacy, securing pervasive social communications becomes important. However, a solution based on a centralized server could be inapplicable in some specific situations (e.g., disasters and military activities) and suffers from DoS/DDoS attacks and internal attacks. How to automatically control data access in a trustworthy and efficient way in PSN is a challenge. In this pape...
Proximity Based Mobile Social Networks (PMSN) is a special type of Mobile Social Network (MSN) where...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
AbstractThis Proposed work is further extension of our previous work, cluster based Soft Security tr...
Social network has extended its popularity from the Internet to mobile domain. Pervasive social netw...
Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive way at...
Pervasive Social Networking (PSN) supports online and instant social activities with the support of ...
Social network has extended its popularity from the Internet to mobile domain. Personal mobile devic...
Pervasive Social Networking (PSN) supports various social activities at any time and in any places w...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
Pervasive social networking (PSN) is facilitating and enriching people’s life at any time and in any...
AbstractIn this paper we discuss related work from literature in security and distributed data manag...
AbstractIn recent years, the rapid expansion of the capability of portable devices, cloud servers an...
Abstract—We propose a straightforward technique to provide peer-to-peer security in mobile networks....
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Proximity Based Mobile Social Networks (PMSN) is a special type of Mobile Social Network (MSN) where...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
AbstractThis Proposed work is further extension of our previous work, cluster based Soft Security tr...
Social network has extended its popularity from the Internet to mobile domain. Pervasive social netw...
Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive way at...
Pervasive Social Networking (PSN) supports online and instant social activities with the support of ...
Social network has extended its popularity from the Internet to mobile domain. Personal mobile devic...
Pervasive Social Networking (PSN) supports various social activities at any time and in any places w...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
Pervasive social networking (PSN) is facilitating and enriching people’s life at any time and in any...
AbstractIn this paper we discuss related work from literature in security and distributed data manag...
AbstractIn recent years, the rapid expansion of the capability of portable devices, cloud servers an...
Abstract—We propose a straightforward technique to provide peer-to-peer security in mobile networks....
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show ...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
Proximity Based Mobile Social Networks (PMSN) is a special type of Mobile Social Network (MSN) where...
Abstract—We study a new application of threshold-based secret sharing in a distributed online social...
AbstractThis Proposed work is further extension of our previous work, cluster based Soft Security tr...