Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks
暂无分享,去创建一个
Yi Li | Limin Sun | Haojin Zhu | Lu Zhou
[1] Zhenfu Cao,et al. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.
[2] Man Lung Yiu,et al. Private and Flexible Proximity Detection in Mobile Social Networks , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[3] Lei Zhu,et al. Protocol to Access White-Space (PAWS) Databases , 2015, RFC.
[4] Haojin Zhu,et al. All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.
[5] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[6] Yaling Yang,et al. Location spoofing attack and its countermeasures in database-driven cognitive radio networks , 2014, 2014 IEEE Conference on Communications and Network Security.
[7] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Jean-Pierre Hubaux,et al. Secure and private proofs for location-based activity summaries in urban areas , 2014, UbiComp.
[9] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[10] Yao Zheng,et al. SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags , 2012, ESORICS.
[11] Xue Liu,et al. Location Cheating: A Security Challenge to Location-Based Social Network Services , 2011, 2011 31st International Conference on Distributed Computing Systems.
[12] Yi Li,et al. Optimal strategies for defending location inference attack in database-driven CRNs , 2015, 2015 IEEE International Conference on Communications (ICC).