Security-oriented opportunistic data forwarding in mobile social networks

D Wu, F Zhang, H Wang, R Wang - Future Generation Computer Systems, 2018 - Elsevier
Abstract In recent years, Mobile Social Networks (MSNs) have been arising a growing
interest in both scientific and industrial fields for its potential value. The effective data …

[HTML][HTML] On general data protection regulation vulnerabilities and privacy issues, for wearable devices and fitness tracking applications

I Ioannidou, N Sklavos - Cryptography, 2021 - mdpi.com
Individual users' sensitive information, such as heart rate, calories burned, or even sleep
patterns, are casually tracked by smart wearable devices to be further processed or …

Android permission manager, visual cues, and their effect on privacy awareness and privacy literacy

V Schmitt, M Poikela, S Möller - … of the 17th International Conference on …, 2022 - dl.acm.org
Android applications request specific permissions from users during the installations to
perform required functionalities by accessing system resources and personal information …

[图书][B] Personalized privacy protection in big data

Y Qu, MR Nosouhi, L Cui, S Yu - 2021 - Springer
Over the past few decades, massive volumes of data in digital form have been generated,
collected, and published with the fast booming of high-performance computing devices and …

Trust management in fog computing

TS Dybedokken - 2017 - ntnuopen.ntnu.no
With the rise of fog computing, computation is moved away from a purely centralized
approach. In the centralized approach devices have direct contact with the cloud servers. In …

Personalized privacy protection solutions

Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu… - … Privacy Protection in Big …, 2021 - Springer
Personalized Privacy Protection Solutions | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …

Ethical and Privacy Considerations with Location Based Data Research

L Tonetto, P Kister, N Mohan, J Ott - arXiv preprint arXiv:2403.05558, 2024 - arxiv.org
Networking research, especially focusing on human mobility, has evolved significantly in the
last two decades and now relies on collection and analyzing larger datasets. The increasing …

[HTML][HTML] Location-visiting characteristics based privacy protection of sensitive relationships

XF Xia, M Jiang, XY Liu, CY Zong - Electronics, 2022 - mdpi.com
In the era of Internet of Things (IoT), the problem of the privacy leakage of sensitive
relationships is critical. This problem is caused by the spatial–temporal correlation between …

A comprehensive review on trust management approaches in fog computing

P Karthikeyan, K Brindha - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Decentralised fog computing can provide real-time interaction, minimize latency,
heterogeneity, and provide networking services between edge devices and cloud data …

Anonymization of geosocial network data by the (k, l)-degree method with location entropy edge selection

J Medková - Proceedings of the 15th International Conference on …, 2020 - dl.acm.org
Geosocial networks (GSNs) have become an important branch of location-based services
since sharing information among friends is the additional feature to provide information …