Privacy-Preserving techniques for the 5G-enabled Location-Based Services

C Wang, P Zhao, H Huang, R Zhang… - 5G-Enabled Internet of …, 2019 - taylorfrancis.com
This chapter provides an overview of the context of fifth generation (5G)-enabled location-
based services (LBSs) and the privacy threats in LBSs and describes the general …

Shared Execution Approach to ε-Distance Join Queries in Dynamic Road Networks

HJ Cho - ISPRS International Journal of Geo-Information, 2018 - mdpi.com
Given a threshold distance ε and two object sets R and S in a road network, an ε-distance
join query finds object pairs from R× S that are within the threshold distance ε (eg, find …

Identifying the scale-dependent motifs in atmospheric surface layer by ordinal pattern analysis

Q Li, Z Fu - Communications in Nonlinear Science and Numerical …, 2018 - Elsevier
Ramp-like structures in various atmospheric surface layer time series have been long
studied, but the presence of motifs with the finer scale embedded within larger scale ramp …

Blockchain Based Security for Vehicular Ad hoc Networks

N Malik - 2020 - opus.lib.uts.edu.au
The speedy aggrandizement in Wireless communication technologies concurrently with
immediate measure requisites to improve road safety have expedited a considerable …

A Time Quanta Bit coding method

Š Vladimír, K Radek, K Jaroslav… - Wireless …, 2020 - search.proquest.com
This paper discusses a new method of coding and/or decoding data for wireless
transmission, particularly for radio transmitted data, and examines the equipment needed for …

An Approach to Improve the Live Migration Using Asynchronized Cache and Prioritized IP Packets

K Mohebbi, MRM Takantapeh - Computer Engineering and …, 2019 - comengapp.unsri.ac.id
The live migration of a virtual machine is a method of moving virtual machines across hosts
within a virtualized data center. Two main parameters should be considered for evaluation of …

[PDF][PDF] OBFUSCATION AND ANONYMIZATION METHODS FOR LOCATIONAL PRIVACY PROTECTION A systematic literature review

MA Vidal - 2019 - core.ac.uk
The mobile technology development combined with the business model of a majority of
application companies is posing a potential risk to individuals' privacy. Because the industry …

[PDF][PDF] & Yixian Yang

Y Lu, G Xu, L Li - Wireless Netw, 2019 - researchgate.net
Secure information exchange in wireless sensor networks (WSN) is a continuing issue since
the resourceconstrained sensors generally deployed over an unattended environment. To …

A Time Quanta Bit coding method

V Šulc, R Kuchta, J Kadlec, Z Kuchtová - Wireless Networks, 2020 - Springer
This paper discusses a new method of coding and/or decoding data for wireless
transmission, particularly for radio transmitted data, and examines the equipment needed for …

Preparation and Adsorption Property of Imido-acetic Acid Type Chelating Nano-fibers by Electro-spinning Technique

J Yang, L Lu, Z Zhang, M Liao, H He, L Li… - IOP Conference …, 2017 - iopscience.iop.org
A novel nano-fibrous adsorbent from imino-acetic acid (IDA) and polyvinyl alcohol (PVA)
mixture solution was prepared by electro-spinning technique. The nano-fibrous adsorbents …