Results 1 to 10 of about 367,191 (281)

Anonymizing Social Graphs via Uncertainty Semantics

open access: yes, 2014
Rather than anonymizing social graphs by generalizing them to super nodes/edges or adding/removing nodes and edges to satisfy given privacy parameters, recent methods exploit the semantics of uncertain graphs to achieve privacy protection of ...
Imine, Abdessamad   +2 more
core   +2 more sources

ReverseCloak: A Reversible Multi-level Location Privacy Protection System [PDF]

open access: yes, 2017
With the fast popularization of mobile devices and wireless networks, along with advances in sensing and positioning technology, we are witnessing a huge proliferation of Location-based Services (LBSs).
Kalaivanan, A   +3 more
core   +1 more source

Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)

open access: yes, 2013
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their sensing capabilities.
De Cristofaro, Emiliano   +1 more
core   +1 more source

Low-latency privacy-enabled Context Distribution Architecture [PDF]

open access: yes, 2012
As personal information and context sharing applications gain traction more attention is drawn to the associated privacy issues. These applications address privacy using an unsatisfactory {"}whitelist{"} approach [1] [2], similar to social networks ...
Aguiar, Rui   +2 more
core   +1 more source

L2P2: Location-aware location privacy protection for location-based services [PDF]

open access: yes2012 Proceedings IEEE INFOCOM, 2012
Location privacy has been a serious concern for mobile users who use location-based services provided by the third-party provider via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users.
Yu Wang   +5 more
openaire   +1 more source

Location privacy protection of maritime mobile terminals

open access: yesDigital Communications and Networks, 2022
Mobile Edge Computing (MEC) can support various high-reliability and low-delay applications in Maritime Networks (MNs). However, security risks in computing task offloading exist.
Xin Su, Su Jiang, Dongmin Choi
doaj   +1 more source

Privacy Challenges With Protecting Live Vehicular Location Context [PDF]

open access: yesIEEE Access, 2020
Future Intelligent Transport Systems (ITS) will require that vehicles are equipped with Dedicated Short Range Communications (DSRC). With these DSRC capabilities, new privacy threats are emerging that can be taken advantage of by threat actors with little experience and cheap components.
Matthew Bradbury   +4 more
openaire   +3 more sources

A localized differential privacy-based location preservation method using a hidden Markov model in vehicular networks

open access: yesFrontiers in Physics
In the rapid development of vehicular networks, the exchange of information between vehicles and between vehicles and the infrastructure is becoming increasingly frequent. Vehicle location data have become one of the core types of information.
Jiwei Li, Qiuju Zhang
doaj   +1 more source

A Survey of Location Privacy Preservation in Social Internet of Vehicles

open access: yesIEEE Access, 2020
Social Internet of Vehicles (SIoV) is an emerging complex network where the features of Social Networks are applied to the SIoV system. User location data forms the basis for the implementation of SIoV functions.
Xiaofan Jia   +3 more
doaj   +1 more source

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

open access: yes, 2017
The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges.
Boualouache, Abdelwahab   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy