MoveWithMe: Location privacy preservation for smartphone users

J Kang, D Steiert, D Lin, Y Fu - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the prevalence of smartphones, mobile websites have been more and more popular.
However, many mobile websites collect the location information which greatly increases …

A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces

Y Li, JH Park, BS Shin - The Journal of Supercomputing, 2017 - Springer
Due to the increasing complexity of internal spaces and dynamic change in certain specific
partitions in large indoor areas, indoor navigation has become more important as it is useful …

Privacy protection model for location-based services

L Ni, Y Liu, Y Liu - Journal of Information Processing Systems, 2020 - koreascience.kr
Solving the disclosure problem of sensitive information with the k-nearest neighbor query,
location dummy technique, or interfering data in location-based services (LBSs) is a new …

Secure handoff technique with reduced authentication delay in wireless mesh network

G Rathee, H Saini - International Journal of Advanced …, 2019 - inderscienceonline.com
The aim of manuscript is to propose a secure handoff procedure by generating the tickets for
the mesh clients which are divided into different zones of mesh routers according to their …

Preserving Location Privacy in the Modern Era of Pervasive Environments

T Nicewaner, A Yu, W Jiang… - 2023 5th IEEE International …, 2023 - ieeexplore.ieee.org
The rapid expansion of location-based services gives rise to significant security and privacy
apprehensions. While these services deliver convenience, they accentuate concerns …

Fuzzy keywords-driven public sports resource allocation strategies retrieval with privacy-preservation

Y Sang, Q Zhang, K Zhang, D Wang, Q Yuan… - IEEE Access, 2020 - ieeexplore.ieee.org
Currently, the government proposes various public sports resource allocation strategies to
promote the construction of public sports in the local. Thus, searching for the document …

Personal information leaks with automatic login in mobile social network services

J Choi, H Cho, JH Yi - Entropy, 2015 - mdpi.com
To log in to a mobile social network service (SNS) server, users must enter their ID and
password to get through the authentication process. At that time, if the user sets up the …

Probabilistic verification scenarios with reduced authentication delay for handoff clients in mesh networks

G Rathee, N Jaglan, H Saini, SD Gupta… - Wireless Personal …, 2019 - Springer
In this paper, we have proposed a secure handoff procedure by generating and assessing
the tickets for each mesh client which are divided among various zones of mesh routers …

Design of a distributed personal information access control scheme for secure integrated payment in NFC

J Kang, JH Park, S Suk - Symmetry, 2015 - mdpi.com
At the center of core technologies for a future cyber world, such as Internet of Things (IoT) or
big data, is a context-rich system that offers services by using situational information. The …

Advances in next era cloud-empowered computing and techniques

JC Hung, G Yi - The Journal of Supercomputing, 2017 - Springer
Cloud computing is defined as a pool of virtualized computing resources. Based on the
virtualization, the cloud computing paradigm allows workloads to be deployed across …