Results 21 to 30 of about 671,947 (282)

Privacy in (mobile) telecommunications services [PDF]

open access: yes, 2005
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den   +4 more
core   +1 more source

Optimal Geo-Indistinguishable Mechanisms for Location Privacy [PDF]

open access: yes, 2014
We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. We show that, given a desired degree of geo-indistinguishability, it is possible to construct a mechanism that minimizes the service quality
Chatzikokolakis K.   +6 more
core   +4 more sources

Privacy-Friendly Mobility Analytics using Aggregate Location Data [PDF]

open access: yes, 2016
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can ...
De Cristofaro, Emiliano   +2 more
core   +2 more sources

Protecting location privacy [PDF]

open access: yesProceedings of the 2012 ACM conference on Computer and communications security, 2012
The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation algorithm behind an effective location-privacy preserving mechanism (LPPM) must consider three ...
Reza Shokri   +4 more
openaire   +1 more source

Survey of Personalized Location Privacy Protection Technologies [PDF]

open access: yesJisuanji kexue
With the proliferation of mobile networks and smart devices,users' geographical location information is being extensively collected and utilized,posing severe challenges to data privacy.In this context,users not only expect to receive effective security ...
CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao
doaj   +1 more source

WLAN Location Sharing through a Privacy Observant Architecture [PDF]

open access: yes, 2006
In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links. Furthermore, the infrastructure already exists in most public places and is cheap to
Havinga, Paul   +4 more
core   +4 more sources

Differential Privacy Preservation for Location Semantics

open access: yesSensors, 2023
With the rapid development of intelligent mobile terminals and communication technologies, location-based services (LBSs) have become an essential part of users’ lives. LBS providers upload and share the collected users’ location data.
Liang Yan   +5 more
doaj   +1 more source

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

Location recommendation privacy protection method based on location sensitivity division

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
Location-based recommendation services can provide users with convenient services, but this requires monitoring and collecting a large amount of location information.
Chunyong Yin   +3 more
doaj   +1 more source

Location Privacy in Spatial Crowdsourcing

open access: yes, 2017
Spatial crowdsourcing (SC) is a new platform that engages individuals in collecting and analyzing environmental, social and other spatiotemporal information.
A Liu   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy