Search Results

1 - 2 of 2 items :

  • Privacy-preserving ride sharing x
  • Databases and Data Mining x
Clear All
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing

-constrained location queries. In 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016 , 2016. [20] C. Hazay and Y. Lindell. Efficient secure two-party protocols: Techniques and constructions . Springer Science & Business Media, 2010. [21] Y. He, J. Ni, X. Wang, B. Niu, F. Li, and X. Shen. Privacy-preserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology , 67(7):5994–6005, 2018. [22] Y. Huang, D. Evans, and J. Katz. Private set intersection: Are garbled circuits better

Open access
PrivateRide: A Privacy-Enhanced Ride-Hailing Service

: May 2016. [7] http://www.businessinsider.com/blake-jareds-50000-uber-credit-free-rides-for-life-2014-4 . Last visited: May 2016. [8] http://fortune.com/2015/03/30/uber-stolen-account-credentials-alphabay/ . Last visited: May 2016. [9] Cryptographic key length recommendation. http://www.keylength.com/en/ . Last visited: May 2016. [10] G. Arfaoui, J.-F. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, and S. Gharout. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. of the 15th Privacy Enhancing Technologies

Open access