Privacy and security in online social networks: A survey

I Kayes, A Iamnitchi - Online Social Networks and Media, 2017 - Elsevier
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …

Achieving k-anonymity in privacy-aware location-based services

B Niu, Q Li, X Zhu, G Cao, H Li - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …

Enhancing privacy through caching in location-based services

B Niu, Q Li, X Zhu, G Cao, H Li - 2015 IEEE conference on …, 2015 - ieeexplore.ieee.org
Privacy protection is critical for Location-Based Services (LBSs). In most previous solutions,
users query service data from the untrusted LBS server when needed, and discard the data …

Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis

F Zafar, A Khan, A Anjum, C Maple, MA Shah - Electronics, 2020 - mdpi.com
In the current hyper-connected, data-driven era, smart devices are providing access to
geolocation information, enabling a paradigm shift in diverse domains. Location proof …

[HTML][HTML] Blockchain based peer to peer communication in autonomous drone operation

MS Kumar, S Vimal, NZ Jhanjhi, SS Dhanabalan… - Energy Reports, 2021 - Elsevier
With the prevalence of Aerospace Technologies, the regulations of cybersecurity are
becoming smarter, assured, and long-lasting. Modern communication network technologies …

Meeting points in ridesharing: A privacy-preserving approach

UM Aïvodji, S Gambs, MJ Huguet… - … Research Part C …, 2016 - Elsevier
Nowadays, problems of congestion in urban areas due to the massive usage of cars, last-
minute travel needs and progress in information and communication technologies have …

Efficient and privacy-aware data aggregation in mobile sensing

Q Li, G Cao, TF La Porta - IEEE Transactions on dependable …, 2013 - ieeexplore.ieee.org
The proliferation and ever-increasing capabilities of mobile devices such as smart phones
give rise to a variety of mobile sensing applications. This paper studies how an untrusted …

Providing privacy-aware incentives for mobile sensing

Q Li, G Cao - 2013 IEEE international conference on pervasive …, 2013 - ieeexplore.ieee.org
Mobile sensing exploits data contributed by mobile users (eg, via their smart phones) to
make sophisticated inferences about people and their surrounding and thus can be applied …

Optimal witnessing of healthcare IoT data using blockchain logging contract

MH Chinaei, HH Gharakheili… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Verification of data generated by wearable sensors is increasingly becoming of concern to
health service providers and insurance companies. These devices are typically vulnerable …

Toward privacy preserving and collusion resistance in a location proof updating system

Z Zhu, G Cao - IEEE Transactions on Mobile Computing, 2011 - ieeexplore.ieee.org
Today's location-sensitive service relies on user's mobile device to determine the current
location. This allows malicious users to access a restricted resource or provide bogus alibis …