Data-driven understanding of smart service systems through text mining

C Lim, PP Maglio - Service Science, 2018 - pubsonline.informs.org
Smart service systems are everywhere, in homes and in the transportation, energy, and
healthcare sectors. However, such systems have yet to be fully understood in the literature …

High stable and accurate vehicle selection scheme based on federated edge learning in vehicular networks

Q Wu, X Wang, Q Fan, P Fan, C Zhang… - China …, 2023 - ieeexplore.ieee.org
Federated edge learning (FEEL) technology for vehicular networks is considered as a
promising technology to reduce the computation workload while keeping the privacy of …

Efficient and privacy-preserving dynamic spatial query scheme for ride-hailing services

F Wang, H Zhu, X Liu, R Lu, F Li, H Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the prosperity of mobile internet and the pervasiveness of location-aware mobile
terminals, online ride-hailing, a high-level location-based service (LBS) which relies on …

A survey on security and privacy challenges in device discovery for next-generation systems

O Hayat, R Ngah, Z Kaleem, SZM Hashim… - IEEE …, 2020 - ieeexplore.ieee.org
Device to Device (D2D) communications is a candidate technology for the fifth-generation
(5G) and beyond mobile networks and certainly that results in high throughput, less energy …

Efficient and privacy-preserving proximity detection schemes for social applications

H Zhu, F Wang, R Lu, F Liu, G Fu… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
With the pervasiveness of location-aware mobile terminals and the popularity of social
applications, location-based social networking service (LBSNS) has brought great …

5G positioning: Security and privacy aspects

ES Lohan, A Alén‐Savikko, L Chen… - … Guide to 5G Security, 2018 - Wiley Online Library
This chapter covers the brief and comprehensive analysis of evolution of cellular systems
from 1st to 4th generation mobile cellular systems. It also covers the basic introduction of the …

Concurrently deniable ring authentication and its application to LBS in VANETs

S Zeng, Y Chen, S Tan, M He - Peer-to-Peer Networking and Applications, 2017 - Springer
Deniable ring authentication can be used to facilitate privacy-preserving communication
since the receiver accepts authentication while cannot convince a third party that the fact of …

Smart prediction for seamless mobility in F-HMIPv6 based on location based services

R Rizk, H Nashaat - China Communications, 2018 - ieeexplore.ieee.org
This paper proposed a new scheme for smooth handoff over F-HMIPv6 networks based on
Location Based Services (LBS). It uses the available information about mobile node (MN) …

“I wasn't there”—Deniable, privacy-aware scheme for decentralized Location-based Services

T Dimitriou, N Al Ibrahim - Future Generation Computer Systems, 2018 - Elsevier
Abstract The use of Location Based Services (LBS) allow mobile users to interact with the
environment and query for the location of persons, objects and services. Such applications …

Efficient deniable authentication and its application in location-based services

E Ahene, J Walker, I Ali, KO Peasah… - Computers and Electrical …, 2022 - Elsevier
Deniable authentication (DA) assures message authentication between sets of participants.
The actual participants can be certain about the messages' authenticity but cannot prove it to …