X Wang, A Pande, J Zhu… - IEEE/ACM transactions …, 2016 - ieeexplore.ieee.org
Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or …
Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or …
R Hasan, R Burns - arXiv preprint arXiv:1107.1821, 2011 - arxiv.org
With the advent of mobile computing, location-based services have recently gained popularity. Many applications use the location provenance of users, ie, the chronological …
A Patel, E Palomar - Trust, Privacy and Security in Digital Business: 14th …, 2017 - Springer
Emerging indoor positioning and WiFi infrastructure enable building apps with numerous Location-based Services (LBS) that represent critical threats to smartphone users' location …
Social networking has evolved as a basic amenity in today's interconnected world. Users of social media tools do not always keep up with privacy policies and its adverse effects. It is …
Recently, there has been a rapid growth in location-based systems and applications in which users submit their location information to service providers in order to gain access to a …
W Luo, U Hengartner - Proceedings of the Eleventh Workshop on Mobile …, 2010 - dl.acm.org
Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained …
J Camenisch, DA Ortiz-Yepes, FS Preiss - … of the 14th ACM Workshop on …, 2015 - dl.acm.org
Mobile devices are increasingly used in security-sensitive contexts such as physical access control and authorization of payment transactions. In this paper we contribute a mechanism …
H Liu, X Li, H Li, J Ma, X Ma - IEEE INFOCOM 2017-IEEE …, 2017 - ieeexplore.ieee.org
Since the dummy-based method can provide precise query results without any requirement for a third party or key sharing, it has been widely used to protect the user's location privacy …