Nothing Special   »   [go: up one dir, main page]

Wang et al., 2018 - Google Patents

Privacy Preservation for Dating Applications

Wang et al., 2018

View PDF
Document ID
5181403148761049911
Author
Wang W
Wang S
Publication year
Publication venue
Procedia Computer Science

External Links

Snippet

Dating applications can satisfy the social contact needs of different users and become tools for developing a social relationship. However, the privacy leakage has turned into an insurmountable obstacle to the market success of social applications. Existing privacy …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Similar Documents

Publication Publication Date Title
Zhang et al. A novel blockchain-based privacy-preserving framework for online social networks
Kaaniche et al. Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Tang et al. Ensuring security and privacy preservation for cloud data services
Gupta et al. Layer-based privacy and security architecture for cloud data sharing
CN108632032A (en) The safe multi-key word sequence searching system of no key escrow
CN107948146A (en) A kind of connection keyword retrieval method based on encryption attribute in mixed cloud
Zhang et al. A blockchain-based anonymous attribute-based searchable encryption scheme for data sharing
Li et al. Traceable and controllable encrypted cloud image search in multi-user settings
Li et al. SPFM: Scalable and privacy-preserving friend matching in mobile cloud
Lim et al. $\mathsf {PrivateLink} $: Privacy-Preserving Integration and Sharing of Datasets
Li et al. A novel privacy-preserving location-based services search scheme in outsourced cloud
Safi et al. Privacy protection scheme for mobile social network
Ou et al. An Efficient and Privacy‐Preserving Multiuser Cloud‐Based LBS Query Scheme
CN108170753A (en) A kind of method of Key-Value data base encryptions and Safety query in shared cloud
Srisakthi et al. Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment
Sharma et al. MapSafe: A complete tool for achieving geospatial data sovereignty
Wang et al. Privacy Preservation for Dating Applications
Zhang et al. Privacy‐Preserving Attribute‐Based Keyword Search with Traceability and Revocation for Cloud‐Assisted IoT
Tang et al. Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing
Brandao Cloud computing security
Tang et al. Verifiable mobile online social network privacy‐preserving location sharing scheme
Maragathavalli et al. Cloud data security model using modified decoy technique in fog computing for E-healthcare
Raj et al. Efficient mechanism for sharing private data in a secured manner
Wang et al. Privacy Preservation for Friend‐Recommendation Applications
Ulybyshev Data Protection in Transit and at Rest with Leakage Detection