A Dual Privacy Preserving Scheme in Continuous Location-Based Services
暂无分享,去创建一个
Md Zakirul Alam Bhuiyan | Guojun Wang | Shaobo Zhang | Qin Liu | Shaobo Zhang | Qin Liu | Guojun Wang
[1] Jie Wu,et al. PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems , 2018, IEEE Communications Magazine.
[2] Jie Wu,et al. Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.
[3] Qiong Huang,et al. Privacy-Preserving Location Sharing Services for Social Networks , 2017, IEEE Transactions on Services Computing.
[4] Qiong Huang,et al. User-Defined Privacy Grid System for Continuous Location-Based Services , 2015, IEEE Transactions on Mobile Computing.
[5] Jie Wu,et al. Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..
[6] Yaping Lin,et al. Anonymizing popularity in online social networks with full utility , 2017, Future Gener. Comput. Syst..
[7] Panagiotis Papadimitratos,et al. Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .
[8] Md Zakirul Alam Bhuiyan,et al. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.
[9] Jianfeng Ma,et al. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.
[10] Tao Peng,et al. Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..
[11] Kim-Kwang Raymond Choo,et al. Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..
[12] Hui Li,et al. Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services , 2017, IEEE Internet of Things Journal.
[13] Ying Cai,et al. A Parity-Based Data Outsourcing Model for Query Authentication and Correction , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).
[14] Hui Li,et al. Protecting User Trajectory in Location-Based Services , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[15] Xiaoqing Li,et al. Privacy-area aware dummy generation algorithms for Location-Based Services , 2014, 2014 IEEE International Conference on Communications (ICC).
[16] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[17] Yonghong Chen,et al. Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.
[18] Rong Zheng,et al. Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[19] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[20] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[21] Ron Steinfeld,et al. Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2007, IEEE Trans. Inf. Theory.
[22] Lichun Li,et al. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data , 2016, IEEE Internet of Things Journal.
[23] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[24] Dong Hoon Lee,et al. Privacy Enhanced Location Sharing for Mobile Online Social Networks , 2020, IEEE Transactions on Sustainable Computing.
[25] Xinwen Fu,et al. Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.
[26] Tao Peng,et al. Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.
[27] Mohamed Grissa,et al. Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing , 2017, IEEE Transactions on Information Forensics and Security.
[28] Jemal H. Abawajy,et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..
[29] Ren-Hung Hwang,et al. A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.
[30] Gang Sun,et al. The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems , 2017, Cluster Computing.