Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang +4 more
doaj +1 more source
Location privacy: The challenges of mobile service devices [PDF]
Adding to the current debate, this article focuses on the personal data and privacy challenges posed by private industry's use of smart mobile devices that provide location-based services to users and consumers.
Cheung, ASY
core +1 more source
Toward an Easy Configuration of Location Privacy Protection Mechanisms [PDF]
Communication orale sur posterInternational audienceThe widespread adoption of Location-Based Services (LBSs) has come with controversy about privacy. While leverag-ing location information leads to improving services through geo-contextualization, it ...
Ben Mokhtar, Sonia +6 more
core +2 more sources
Privacy protection for Wi-Fi location positioning systems [PDF]
With the democratization of mobile devices embedding different positioning capabilities, location information is used for a variety of applications. On mobile devices, the geolocation can be obtained via GPS or by leveraging surrounding network infrastructure such as Wi-Fi access points.
Boutet, Antoine, Cunche, Mathieu
openaire +2 more sources
LBS privacy protection technology based on searchable encryption mechanism
Location based Service (the Location - -based Service, LBS) is a System is to transform the existing mobile communication network, wireless sensor networks, and Global Positioning System (Global Positioning System, GPS) with the combination of ...
Feng Tao, Wang Xudong, Li Xinghua
doaj +1 more source
An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP) [PDF]
open access articleWireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access.
Al-Bayati, Ali H. +3 more
core +1 more source
Location privacy protection scheme for LBS users based ondifferential privacy
In order to take into account the availability of shared location data and privacy protection requirements,aiming at the shared location information collected by the third party,a location privacy protection scheme of LBS users was proposed based on ...
Naiwen YU +3 more
doaj +1 more source
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography [PDF]
Human mobility is undisputedly one of the critical factors in infectious disease dynamics. Until a few years ago, researchers had to rely on static data to model human mobility, which was then combined with a transmission model of a particular disease ...
Bampoulidis, Alexandros +5 more
core +1 more source
Privacy in context : an evaluation of policy-based approaches to location privacy protection [PDF]
Peer ...
Cottrill, Caitlin D. +1 more
core +1 more source
Research of location privacy protection in wireless sensor network
For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the ...
Ren-ji HUANG,Qing YE, Qian WU
doaj +3 more sources

