Wang et al., 2018 - Google Patents
Privacy Preservation for Dating ApplicationsWang et al., 2018
View PDF- Document ID
- 5181403148761049911
- Author
- Wang W
- Wang S
- Publication year
- Publication venue
- Procedia Computer Science
External Links
Snippet
Dating applications can satisfy the social contact needs of different users and become tools for developing a social relationship. However, the privacy leakage has turned into an insurmountable obstacle to the market success of social applications. Existing privacy …
- 238000004321 preservation 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | A novel blockchain-based privacy-preserving framework for online social networks | |
Kaaniche et al. | Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms | |
Tang et al. | Ensuring security and privacy preservation for cloud data services | |
Gupta et al. | Layer-based privacy and security architecture for cloud data sharing | |
CN108632032A (en) | The safe multi-key word sequence searching system of no key escrow | |
CN107948146A (en) | A kind of connection keyword retrieval method based on encryption attribute in mixed cloud | |
Zhang et al. | A blockchain-based anonymous attribute-based searchable encryption scheme for data sharing | |
Li et al. | Traceable and controllable encrypted cloud image search in multi-user settings | |
Li et al. | SPFM: Scalable and privacy-preserving friend matching in mobile cloud | |
Lim et al. | $\mathsf {PrivateLink} $: Privacy-Preserving Integration and Sharing of Datasets | |
Li et al. | A novel privacy-preserving location-based services search scheme in outsourced cloud | |
Safi et al. | Privacy protection scheme for mobile social network | |
Ou et al. | An Efficient and Privacy‐Preserving Multiuser Cloud‐Based LBS Query Scheme | |
CN108170753A (en) | A kind of method of Key-Value data base encryptions and Safety query in shared cloud | |
Srisakthi et al. | Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment | |
Sharma et al. | MapSafe: A complete tool for achieving geospatial data sovereignty | |
Wang et al. | Privacy Preservation for Dating Applications | |
Zhang et al. | Privacy‐Preserving Attribute‐Based Keyword Search with Traceability and Revocation for Cloud‐Assisted IoT | |
Tang et al. | Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing | |
Brandao | Cloud computing security | |
Tang et al. | Verifiable mobile online social network privacy‐preserving location sharing scheme | |
Maragathavalli et al. | Cloud data security model using modified decoy technique in fog computing for E-healthcare | |
Raj et al. | Efficient mechanism for sharing private data in a secured manner | |
Wang et al. | Privacy Preservation for Friend‐Recommendation Applications | |
Ulybyshev | Data Protection in Transit and at Rest with Leakage Detection |