Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Pseudonym schemes in vehicular networks: A survey

J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2014 - ieeexplore.ieee.org
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

Information security in big data: privacy and data mining

L Xu, C Jiang, J Wang, J Yuan, Y Ren - Ieee Access, 2014 - ieeexplore.ieee.org
The growing popularity and development of data mining technologies bring serious threat to
the security of individual,'s sensitive information. An emerging research topic in data mining …

Indoor location based services challenges, requirements and usability of current solutions

A Basiri, ES Lohan, T Moore, A Winstanley… - Computer Science …, 2017 - Elsevier
Abstract Indoor Location Based Services (LBS), such as indoor navigation and tracking, still
have to deal with both technical and non-technical challenges. For this reason, they have …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

An effective secured privacy-protecting data aggregation method in IoT

S Pramanik - Achieving Full Realization and Mitigating the …, 2022 - igi-global.com
Because privacy concerns in IoT devices are the most sensitive of all the difficulties, such an
extreme growth in IoT usage has an impact on the privacy and life spans of IoT devices …

Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing

Z A. Almusaylim, NZ Jhanjhi - Wireless Personal Communications, 2020 - Springer
One of the recent trends of networking and mobile technology is mobile cloud computing
(MCC) that provides rich computational, storage resources and services in clouds to mobile …

Preserving privacy in internet of things: a survey

AA Abi Sen, FA Eassa, K Jambi, M Yamin - International Journal of …, 2018 - Springer
Internet of things (IOT) paradigm is changing day to day lives towards sophisticated
automation and enhancing living standards of our societies. The most of “Things” in IOT are …

[PDF][PDF] 位置大数据隐私保护研究综述

王璐, 孟小峰 - 软件学报, 2014 - jos.org.cn
大数据时代移动通信和传感设备等位置感知技术的发展形成了位置大数据, 为人们的生活,
商业运作方法以及科学研究带来了巨大收益. 由于位置大数据用途多样, 内容交叉冗余 …

Analysis of security issues and countermeasures for the industrial internet of things

S Pal, Z Jadidi - Applied Sciences, 2021 - mdpi.com
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT)
services and applications to industry with the inclusion of Industry 4.0 that provides …