Results 1 to 10 of about 675,521 (280)
Location privacy protection scheme for LBS users based ondifferential privacy
In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on ...
Naiwen YU +3 more
doaj +1 more source
RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang +3 more
doaj +1 more source
PinMe: Tracking a Smartphone User around the World
With the pervasive use of smartphones that sense, collect, and process valuable information about the environment, ensuring location privacy has become one of the most important concerns in the modern age.
Dai, Xiaoliang +3 more
core +1 more source
Spatio-Temporal Location Privacy Quantification for Vehicular Networks
Connected vehicles continuously reveal their location information to the potential observers that then track vehicles over time and space. However, safety applications require disseminating such location information to the vicinity, which essentially ...
Jian Wang +3 more
doaj +1 more source
LBS privacy protection technology based on searchable encryption mechanism
Location based Service (the Location - -based Service, LBS) is a System is to transform the existing mobile communication network, wireless sensor networks, and Global Positioning System (Global Positioning System, GPS) with the combination of ...
Feng Tao, Wang Xudong, Li Xinghua
doaj +1 more source
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy
In recent years, the widespread prevalence of smart devices has created a new class of mobile Internet of Thing applications. Called mobile crowdsensing, these techniques use workers with mobile devices to collect data and send it to task requester for ...
Mengmeng Yang +3 more
doaj +1 more source
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed +2 more
core +1 more source
Research progress on location privacy-preserving techniques
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy.
Sheng WAN +4 more
doaj +2 more sources
Knowing Your Population: Privacy-Sensitive Mining of Massive Data
Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications.
Boman, Magnus +4 more
core +1 more source
An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services
With the rapid development of GPS-equipped smart mobile devices and mobile computing, location-based services (LBS) are increasing in popularity in the Internet of Things (IoT).
Yongwen Du +4 more
doaj +1 more source

