Results 51 to 60 of about 367,191 (281)
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef +8 more
core +1 more source
An Enhanced Communication Protocol for Location Privacy in WSN [PDF]
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing.
Abdel-Shakour Abuzneid +6 more
core +2 more sources
A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins [PDF]
Location check-ins contain both geographical and semantic information about the visited venues. Semantic information is usually represented by means of tags (e.g., “restaurant”). Such data can reveal some personal information about users beyond what they
Bilogrevic, I. +6 more
core +4 more sources
Knowing Your Population: Privacy-Sensitive Mining of Massive Data
Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications.
Boman, Magnus +4 more
core +1 more source
Software-Defined Location Privacy Protection for Vehicular Networks [PDF]
While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs).
Boualouache, Abdelwahab +3 more
openaire +2 more sources
Research on location privacy protection of mobile terminals for maritime monitoring sensor networks
Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task ...
Xin SU, Su JIANG, Yiqing ZHOU
doaj +2 more sources
The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems
With the development of mobile devices, mobile crowdsourcing has become the research hotspot in mobile crowd sensing networks (MCSS). How to protect the location privacy of mobile user in location-based services is a key problem in MCSS.
Zhongyang Chi +3 more
doaj +1 more source
Recommending Location Privacy Preferences in Ubiquitous Computing [PDF]
Location-Based Services have become increasingly popular due to the prevalence of smart devices. The protection of users’ location privacy in such systems is a vital issue.
Henderson, Tristan +2 more
core
A Middleware for the Internet of Things
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion.
Cheung, Hon +2 more
core +2 more sources
Self-certified sybil-free pseudonyms [PDF]
Accurate and trusted identifiers are a centerpiece for any security architecture. Protecting against Sybil attacks in a privacy-friendly manner is a non-trivial problem in wireless infrastructureless networks, such as mobile ad hoc networks.
Andriy Panchenko +3 more
core +1 more source

