Results 31 to 40 of about 675,521 (280)

Continuous location privacy protection mechanism based on differential privacy

open access: yesTongxin xuebao, 2021
Aiming at the problem of users’ location privacy leakage caused by continuously using LBS, a road privacy level (RPL) algorithm was proposed based on road topological network, which divided the privacy level of the road sections around the sensitive ...
Hongtao LI   +3 more
doaj   +2 more sources

Privacy in (mobile) telecommunications services [PDF]

open access: yes, 2005
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den   +4 more
core   +1 more source

Optimal Geo-Indistinguishable Mechanisms for Location Privacy [PDF]

open access: yes, 2014
We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. We show that, given a desired degree of geo-indistinguishability, it is possible to construct a mechanism that minimizes the service quality
Chatzikokolakis K.   +6 more
core   +4 more sources

Search Me If You Can: Privacy-preserving Location Query Service [PDF]

open access: yes, 2013
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
Jung, Taeho, Li, Xiang-Yang
core   +2 more sources

Protecting location privacy [PDF]

open access: yesProceedings of the 2012 ACM conference on Computer and communications security, 2012
The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation algorithm behind an effective location-privacy preserving mechanism (LPPM) must consider three ...
Reza Shokri   +4 more
openaire   +1 more source

Survey of Personalized Location Privacy Protection Technologies [PDF]

open access: yesJisuanji kexue
With the proliferation of mobile networks and smart devices,users' geographical location information is being extensively collected and utilized,posing severe challenges to data privacy.In this context,users not only expect to receive effective security ...
CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao
doaj   +1 more source

Privacy-Friendly Mobility Analytics using Aggregate Location Data [PDF]

open access: yes, 2016
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can ...
De Cristofaro, Emiliano   +2 more
core   +2 more sources

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

Location recommendation privacy protection method based on location sensitivity division

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
Location-based recommendation services can provide users with convenient services, but this requires monitoring and collecting a large amount of location information.
Chunyong Yin   +3 more
doaj   +1 more source

Location Privacy in Spatial Crowdsourcing

open access: yes, 2017
Spatial crowdsourcing (SC) is a new platform that engages individuals in collecting and analyzing environmental, social and other spatiotemporal information.
A Liu   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy