Individual users' sensitive information, such as heart rate, calories burned, or even sleep patterns, are casually tracked by smart wearable devices to be further processed or …
Android applications request specific permissions from users during the installations to perform required functionalities by accessing system resources and personal information …
Over the past few decades, massive volumes of data in digital form have been generated, collected, and published with the fast booming of high-performance computing devices and …
With the rise of fog computing, computation is moved away from a purely centralized approach. In the centralized approach devices have direct contact with the cloud servers. In …
Personalized Privacy Protection Solutions | SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
L Tonetto, P Kister, N Mohan, J Ott - arXiv preprint arXiv:2403.05558, 2024 - arxiv.org
Networking research, especially focusing on human mobility, has evolved significantly in the last two decades and now relies on collection and analyzing larger datasets. The increasing …
In the era of Internet of Things (IoT), the problem of the privacy leakage of sensitive relationships is critical. This problem is caused by the spatial–temporal correlation between …
P Karthikeyan, K Brindha - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Decentralised fog computing can provide real-time interaction, minimize latency, heterogeneity, and provide networking services between edge devices and cloud data …
J Medková - Proceedings of the 15th International Conference on …, 2020 - dl.acm.org
Geosocial networks (GSNs) have become an important branch of location-based services since sharing information among friends is the additional feature to provide information …