Results 11 to 20 of about 310,711 (289)

GL-Tree: A Hierarchical Tree Structure for Efficient Retrieval of Massive Geographic Locations

open access: yesSensors, 2023
Location-based application services and location privacy protection solutions are often required for the storage, management, and efficient retrieval of large amounts of geolocation data for specific locations or location intervals.
Bin Liu, Chunyong Zhang, Yang Xin
doaj   +1 more source

VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain

open access: yesApplied Sciences, 2023
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from ...
Bochuan Hou   +4 more
doaj   +1 more source

A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks

open access: yesApplied Sciences, 2020
With the advent of intelligent handheld devices, location sharing becomes one of the most popular services in mobile online social networks (mOSNs). In location-sharing services, users can enjoy a better social experience by updating their real-time ...
Guangcan Yang   +6 more
doaj   +1 more source

Engaging youth in post-disaster research: Lessons learned from a creative methods approach [PDF]

open access: yes, 2016
Children and youth often demonstrate resilience and capacity in the face of disasters. Yet, they are typically not given the opportunities to engage in youth-driven research and lack access to official channels through which to contribute their ...
Cox, Robin S   +5 more
core   +3 more sources

Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme

open access: yesIEEE Access, 2019
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian   +3 more
doaj   +1 more source

Consuming post-disaster destinations: The case of Sichuan, China [PDF]

open access: yes, 2014
Addressing the call for a better understanding of tourist behavior in relation to post-disaster destinations, this study explores the motivations and intentions of potential domestic tourists (from non-hit areas) to visit Sichuan, China in the aftermath ...
Aguiló   +79 more
core   +2 more sources

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework

open access: yesIEEE Access, 2019
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang   +4 more
doaj   +1 more source

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture

open access: yesInternational Journal of Distributed Sensor Networks, 2015
There is an increasing demand of an anonymous authentication to secure communications between numerous different network members while preserving privacy for the members.
Yanrong Lu   +4 more
doaj   +1 more source

Lahar characteristics as a function of triggering mechanism at a seasonally snow-clad volcano: contrasting lahars following the 2014 phreatic eruption of Ontake Volcano, Japan

open access: yesEarth, Planets and Space, 2018
In association with the September 2014 phreatic eruption (VEI 1–2) at Ontake Volcano, a syn-eruptive and two post-eruptive lahars occurred in the Akagawa–Nigorigawa River, southern flank of the volcano.
Kyoko S. Kataoka   +7 more
doaj   +1 more source

DGS-HSA: A Dummy Generation Scheme Adopting Hierarchical Structure of the Address

open access: yesApplied Sciences, 2020
With the increasing convenience of location-based services (LBSs), there have been growing concerns about the risk of privacy leakage. We show that existing techniques fail to defend against a statistical attack meant to infer the user’s location privacy
Mingzhen Li   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy