Results 51 to 60 of about 367,191 (281)

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

An Enhanced Communication Protocol for Location Privacy in WSN [PDF]

open access: yes, 2015
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing.
Abdel-Shakour Abuzneid   +6 more
core   +2 more sources

A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins [PDF]

open access: yes, 2018
Location check-ins contain both geographical and semantic information about the visited venues. Semantic information is usually represented by means of tags (e.g., “restaurant”). Such data can reveal some personal information about users beyond what they
Bilogrevic, I.   +6 more
core   +4 more sources

Knowing Your Population: Privacy-Sensitive Mining of Massive Data

open access: yes, 2013
Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications.
Boman, Magnus   +4 more
core   +1 more source

Software-Defined Location Privacy Protection for Vehicular Networks [PDF]

open access: yes, 2021
While the adoption of connected vehicles is growing, security and privacy concerns are still the key barriers raised by society. These concerns mandate automakers and standardization groups to propose convenient solutions for privacy preservation. One of the main proposed solutions is the use of Pseudonym-Changing Strategies (PCSs).
Boualouache, Abdelwahab   +3 more
openaire   +2 more sources

Research on location privacy protection of mobile terminals for maritime monitoring sensor networks

open access: yes物联网学报, 2021
Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task ...
Xin SU, Su JIANG, Yiqing ZHOU
doaj   +2 more sources

The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems

open access: yesIEEE Access, 2018
With the development of mobile devices, mobile crowdsourcing has become the research hotspot in mobile crowd sensing networks (MCSS). How to protect the location privacy of mobile user in location-based services is a key problem in MCSS.
Zhongyang Chi   +3 more
doaj   +1 more source

Recommending Location Privacy Preferences in Ubiquitous Computing [PDF]

open access: yes, 2014
Location-Based Services have become increasingly popular due to the prevalence of smart devices. The protection of users’ location privacy in such systems is a vital issue.
Henderson, Tristan   +2 more
core  

A Middleware for the Internet of Things

open access: yes, 2016
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion.
Cheung, Hon   +2 more
core   +2 more sources

Self-certified sybil-free pseudonyms [PDF]

open access: yes, 2008
Accurate and trusted identifiers are a centerpiece for any security architecture. Protecting against Sybil attacks in a privacy-friendly manner is a non-trivial problem in wireless infrastructureless networks, such as mobile ad hoc networks.
Andriy Panchenko   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy