Results 281 to 290 of about 3,780,326 (325)
Some of the next articles are maybe not open access.
Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration
IEEE Network, 2020LPPMs have been well surveyed based on the view of methodologies, attacks, and so on. It has long been ignored that LBS applicability will be sacrificed due to the implementation of LPPMs. Existing and future LPPMs should clearly claim LBS applicability.
Zhihong Tian +3 more
semanticscholar +1 more source
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks
IEEE Transactions on Information Forensics and Security, 2020An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect radio traffic distributions and trace back messages to their source nodes.
Na Wang +3 more
semanticscholar +1 more source
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks
IEEE Wireless Communications Letters, 2020With the development of vehicular network, location-based services (LBSs) provide increasing diversified services for drivers and passengers. When users enjoy the services, users’ location needs to be constantly updated to service providers, which causes
Chuan Xu +4 more
semanticscholar +1 more source
Wireless location privacy protection
Computer, 2003After more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature.
Bill N. Schilit +2 more
openaire +1 more source
A survey on location privacy protection in Wireless Sensor Networks
Journal of Network and Computer Applications, 2019Location of sensor nodes is one of the most important and fundamental information for Wireless Sensor Networks (WSNs), because it provides basic support for many location-based applications (e.g., navigation and object tracking) and location-aware ...
Jinfang Jiang +3 more
semanticscholar +1 more source
Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing Via Geo-Indistinguishability
IEEE International Conference on Distributed Computing Systems, 2019Nowadays, vehicles have been increasingly adopted as participants in many spatial crowdsourcing (SC) applications. Similar to other SC applications, location privacy is of great concern to vehicle workers as they are required to disclose their own ...
A. Squicciarini, Chenxi Qiu
semanticscholar +1 more source
Location privacy for group meetups
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2016A Group Nearest Neighbor (GNN) query finds a point of interest (POI) that minimizes the aggregate distance for a group of users. In current systems, users have to reveal their exact, often sensitive locations to issue a GNN query. This calls for private GNN queries.
A. K. M. Mustafizur Rahman Khan +2 more
openaire +1 more source
2012
Όλο και περισσότερες εφαρμογές κάνουν χρήση δεδομένων θέσης με σκοπό την παροχή υπηρεσιών προς τους τελικούς πελάτες. Παραδείγματα τέτοιων υπηρεσιών αποτελούν οι υπηρεσίες δρομολόγησης (navigation) καθώς και η εμφάνιση πλησιέστερων σημείων ενδιαφέροντος (Points of Interest), αλλά και εφαρμογές επαυξημένης πραγματικότητας (AR). Ωστόσο αυτές οι υπηρεσίες
openaire +1 more source
Όλο και περισσότερες εφαρμογές κάνουν χρήση δεδομένων θέσης με σκοπό την παροχή υπηρεσιών προς τους τελικούς πελάτες. Παραδείγματα τέτοιων υπηρεσιών αποτελούν οι υπηρεσίες δρομολόγησης (navigation) καθώς και η εμφάνιση πλησιέστερων σημείων ενδιαφέροντος (Points of Interest), αλλά και εφαρμογές επαυξημένης πραγματικότητας (AR). Ωστόσο αυτές οι υπηρεσίες
openaire +1 more source
Location privacy scheme for VANETs
2017 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), 2017In Vehicular Ad Hoc Networks (VANETs), a vehicle could be identified and tracked by eavesdropping its messages (e.g., beacons) by an adversary, since these messages contain personal information such as the location of the vehicle. This attack leads to threats on the user's location privacy.
Ines Khacheba +3 more
openaire +2 more sources
2018
Advances in technology have provided ways to measure driving behavior. Recently, this technology has been applied to usage-based automotive insurance. Policy holders may opt-in to monitoring for the hope of reduced insurance premiums. Although some of these monitoring devices are based upon GPS information and offer no location privacy protections ...
openaire +1 more source
Advances in technology have provided ways to measure driving behavior. Recently, this technology has been applied to usage-based automotive insurance. Policy holders may opt-in to monitoring for the hope of reduced insurance premiums. Although some of these monitoring devices are based upon GPS information and offer no location privacy protections ...
openaire +1 more source

