完全两分匿名实现位置隐私

董恺, 顾涛, 陶先平, 吕建 - 计算机科学技术学报, 2014 - jcst.ict.ac.cn
… discover and authenticate each other without knowing their … of the cloaked obfuscation
method by reducing it to that of the … user privacy with the functionality for location-based services. …

[PDF][PDF] 结合锚点优选算法改进的SpaceTwist 隐私保护方法

刘振鹏, 赵璇, 董亚伟, 张彬 - Journal on Communications, 2017 - infocomm-journal.com
… : With location-based services worldwide used, private locationauthentication server added
to distributed system structure, user generate a k anonymous area according to their privacy

一种面向位置感知推荐系统的隐私保框架

X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu - Science China Information …, 2017 - Springer
… To test all factors affecting the efficiency of our APPLET, we randomly selected 1051
location-based … FINE: a fine-grained privacy-preserving location-based service framework for …

[PDF][PDF] 保护位置隐私近邻查询中隐私偏好问题研究

倪巍伟, 陈萧 - 软件学报, 2016 - jos.org.cn
… : Privacy protection problem in location based service … , especially for location privacy protection
in location based nearest … processing for location services without compromising privacy. …

基于公交车缓存的车联网位置隐私保护方案

崔杰, 陈学峰, 张静, 魏璐, 仲红 - 通信学报, 2021 - infocomm-journal.com
location leakage when vehicles use location-based service (… of the real location of the private
vehicle by reducing the number of … Extensible conditional privacy protection authentication

[HTML][HTML] 面向外包空间数据库的范围查询验证

胡晓燕, 王静宇, 李海荣 - 计算机应用, 2017 - m.fx361.com
… 例如,在基于位置服务(Location-Based Service, LBS)查询应用中,服务提供商(Services Provider…
Data stream range query authentication scheme based on PMD in outsourced database[J]. …

[PDF][PDF] 车联网隐私保护技术研究

李瑞琴, 胡晓雅, 张倨源, 王励成 - Journal of Cyber Security 信息安全 …, 2024 - jcs.iie.ac.cn
privacy, anonymous authentication location privacy and Internet of Vehicles location service
privacy, we introduce the important role played by anonymous authentication, pseudonym …

[PDF][PDF] 李平, 林亚平, 曾玮妮

P LI, YP LIN, WN ZENG - Journal of Software, 2006 - jos.org.cn
confidentiality, authentication, integrity and freshness. Symmetric key cryptography and message
authentication … uses authentication key instead of individual key for reducing its function …

[PDF][PDF] 将电气工程师学会1609.2-2016 标准与基于事物的低功耗设备互连

Y Al-Nidawi, MZ Abdullah - 西南交通大学学报, 2020 - researchgate.net
… , pseudonymity, accountability (nonrepudiation) and location privacy. On the other hand,
as … of authentication only, confidentiality only, or both authentication and confidentiality. …

[PDF][PDF] 无线传感器网络密钥管理的方案和协议

苏忠, 林闯, 封富君, 任丰原 - 2007 - jos.org.cn
authentication).SNEP 主要通过使用计数器(counter),消息认证码(message authentication
code,… Location-Based compromise-tolerant security mechanisms for wireless sensor networks. …