Privacy-aware cloaking technique in location-based services

A Hossain, AA Hossain, SJ Jang… - 2012 IEEE First …, 2012 - ieeexplore.ieee.org
The explosive growth of location-detection devices, such as GPS (Global Positioning
System), continuously increasing users' privacy threat in location-based services (LBSs) …

Distributed sensor information management architecture based on semantic analysis of sensing data

T Kawakami, BLN Ly, S Takeuchi… - … on Applications and …, 2008 - ieeexplore.ieee.org
In the ubiquitous computing environment, we believe that P2P-based context-aware
application utilizing sensing data is important. However, since sensors are not placed under …

Method and apparatus for authenticating location-based services without compromising location privacy

H Hu, J Xu, Q Chen - US Patent 9,043,927, 2015 - Google Patents
A method and an apparatus for authenticating location-based services without
compromising location privacy, which comprises a comprehensive solution that preserves …

[PDF][PDF] 基于位置服务的隐私保护

孟小峰, 潘晓 - 中国计算机学会通讯, 2010 - idke.ruc.edu.cn
第三种方法是空间加密[7], 即通过对位置加密达到匿名的效果. 继续前面的例子,
首先将整个空间旋转一个角度(如图3), 在旋转后的空间中建立希尔伯特(Hilbert) 曲线 …

Range-based nearest neighbor queries with complex-shaped obstacles

H Zhu, X Yang, B Wang, WC Lee - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we study a novel variant of obstructed nearest neighbor queries, namely,
range-based obstructed nearest neighbor (RONN) search. As a natural generalization of …

On efficient processing of complicated cloaked region for location privacy aware nearest-neighbor queries

CN Ngo, TK Dang - … Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia …, 2013 - Springer
The development of location-based services has brought not only conveniences to users'
daily life but also great concerns about users' location privacy. Thus, privacy aware query …

LBS 中面向K-匿名服务资源约束的匿名度调节算法

杨朝晖, 李善平, 林欣 - 浙江大学学报(工学版), 2011 - cqvip.com
针对基于位置的服务(LBS) 中的K-匿名机制以固定的最小匿名度为服务质量(QoS) 指标,
不能在计算资源允许的条件下为用户提供更高匿名度的问题, 提出定义新的QoS 指标 …

一种抗侧信道攻击椭圆曲线标量乘算法的设计与实现.

刘丽, 徐明 - Application Research of Computers/Jisuanji …, 2017 - search.ebscohost.com
有限域GF (2m) 上点乘运算是影响椭圆曲线密码实现效率的关键运算之一. 为提高椭圆曲线密码
算法计算的安全性和效率性, 从分析固定基点梳形(fixed basecomb) 算法的特点出发 …

Protecting privacy for distance and rank based group nearest neighbor queries

T Hashem, L Kulik, K Ramamohanarao, R Zhang… - World Wide Web, 2019 - Springer
This paper proposes a novel approach to safeguarding location privacy for GNN (group
nearest neighbor) queries. Given the locations of a group of dispersed users, the GNN query …

X‐Region: A framework for location privacy preservation in mobile peer‐to‐peer networks

Y Che, Q He, X Hong, K Chiew - International Journal of …, 2015 - Wiley Online Library
While enjoying various LBS (location‐based services), users also face the threats of location
privacy disclosure. This is because even if the communications between users and LBS …