GL-Tree: A Hierarchical Tree Structure for Efficient Retrieval of Massive Geographic Locations
Location-based application services and location privacy protection solutions are often required for the storage, management, and efficient retrieval of large amounts of geolocation data for specific locations or location intervals.
Bin Liu, Chunyong Zhang, Yang Xin
doaj +1 more source
VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from ...
Bochuan Hou +4 more
doaj +1 more source
A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks
With the advent of intelligent handheld devices, location sharing becomes one of the most popular services in mobile online social networks (mOSNs). In location-sharing services, users can enjoy a better social experience by updating their real-time ...
Guangcan Yang +6 more
doaj +1 more source
Engaging youth in post-disaster research: Lessons learned from a creative methods approach [PDF]
Children and youth often demonstrate resilience and capacity in the face of disasters. Yet, they are typically not given the opportunities to engage in youth-driven research and lack access to official channels through which to contribute their ...
Cox, Robin S +5 more
core +3 more sources
Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian +3 more
doaj +1 more source
Consuming post-disaster destinations: The case of Sichuan, China [PDF]
Addressing the call for a better understanding of tourist behavior in relation to post-disaster destinations, this study explores the motivations and intentions of potential domestic tourists (from non-hit areas) to visit Sichuan, China in the aftermath ...
Aguiló +79 more
core +2 more sources
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang +4 more
doaj +1 more source
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture
There is an increasing demand of an anonymous authentication to secure communications between numerous different network members while preserving privacy for the members.
Yanrong Lu +4 more
doaj +1 more source
In association with the September 2014 phreatic eruption (VEI 1–2) at Ontake Volcano, a syn-eruptive and two post-eruptive lahars occurred in the Akagawa–Nigorigawa River, southern flank of the volcano.
Kyoko S. Kataoka +7 more
doaj +1 more source
DGS-HSA: A Dummy Generation Scheme Adopting Hierarchical Structure of the Address
With the increasing convenience of location-based services (LBSs), there have been growing concerns about the risk of privacy leakage. We show that existing techniques fail to defend against a statistical attack meant to infer the user’s location privacy
Mingzhen Li +8 more
doaj +1 more source

