Assuring spatio-temporal integrity on mobile devices with minimum location disclosure

H Hu, Q Chen, J Xu, B Choi - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
Since the boom of smartphones and location-based services, spatio-temporal data (ie, user
locations with timestamps) have become increasingly essential in many real-life …

STAMP: Enabling privacy-preserving location proofs for mobile users

X Wang, A Pande, J Zhu… - IEEE/ACM transactions …, 2016 - ieeexplore.ieee.org
Location-based services are quickly becoming immensely popular. In addition to services
based on users' current location, many potential services rely on users' location history, or …

STAMP: Ad hoc spatial-temporal provenance assurance for mobile users

X Wang, J Zhu, A Pande, A Raghuramu… - 2013 21st IEEE …, 2013 - ieeexplore.ieee.org
Location-based services are quickly becoming immensely popular. In addition to services
based on users' current location, many potential services rely on users' location history, or …

Where have you been? secure location provenance for mobile devices

R Hasan, R Burns - arXiv preprint arXiv:1107.1821, 2011 - arxiv.org
With the advent of mobile computing, location-based services have recently gained
popularity. Many applications use the location provenance of users, ie, the chronological …

A middleware enforcing location privacy in mobile platform

A Patel, E Palomar - Trust, Privacy and Security in Digital Business: 14th …, 2017 - Springer
Emerging indoor positioning and WiFi infrastructure enable building apps with numerous
Location-based Services (LBS) that represent critical threats to smartphone users' location …

Supporting location information privacy in mobile devices

D Nayak, MV Swamy, S Ramaswamy - … February 5-8, 2013. Proceedings 9, 2013 - Springer
Social networking has evolved as a basic amenity in today's interconnected world. Users of
social media tools do not always keep up with privacy policies and its adverse effects. It is …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

Proving your location without giving up your privacy

W Luo, U Hengartner - Proceedings of the Eleventh Workshop on Mobile …, 2010 - dl.acm.org
Although location-based applications have existed for several years, verifying the
correctness of a user's claimed location is a challenge that has only recently gained …

Strengthening authentication with privacy-preserving location verification of mobile phones

J Camenisch, DA Ortiz-Yepes, FS Preiss - … of the 14th ACM Workshop on …, 2015 - dl.acm.org
Mobile devices are increasingly used in security-sensitive contexts such as physical access
control and authorization of payment transactions. In this paper we contribute a mechanism …

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services

H Liu, X Li, H Li, J Ma, X Ma - IEEE INFOCOM 2017-IEEE …, 2017 - ieeexplore.ieee.org
Since the dummy-based method can provide precise query results without any requirement
for a third party or key sharing, it has been widely used to protect the user's location privacy …