As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, …
S Farhang, Y Hayel, Q Zhu - … on Communications and Network …, 2015 - ieeexplore.ieee.org
… for mobile users/base stations association in wirelessnetworks. We address the location privacy issues in nextgenerationwirelessnetwork … We propose the location privacy preserving …
P Urien, G Pujolle - International Journal of Network …, 2008 - Wiley Online Library
This paper presents research performed during the last 4 years (2003–2007), in order to design applications (usually referred as EAP smart cards) which enhance security and privacy …
MK Khan, Y Xiang, SJ Horng… - … Sensor Networks, 2013 - journals.sagepub.com
… Security and privacy are critical issues to many sensor network applications, and it is a … Providing security and privacy to WSNs is challenging due to the open nature of wireless …
… Next-generationwirelessnetworks (NGWN) aim to … with privacy regulation compliance based on blockchain. Finally, we identify further research directions for achieving DM with privacy …
… generation of cellularwirelessnetworks. SAE is all-IP based. In this paper, we discuss issues that the nextgenerationwirelessnetworks (NGWN… We call these post-SAE networks. These …
Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. …
O Tene - International data privacy law, 2011 - academic.oup.com
… a newgeneration of privacy governance to cope with the implications of the newgeneration … I outline below some major examples of a newgeneration of technologies that are …
C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
… a network. One focus in this paper is to analyze the existing mobileprivacy schemes in wireless networks … be honest, and then to devise a privacy protection soultion for EMAS under this …