Authenticating location-based services without compromising location privacy

H Hu, J Xu, Q Chen, Z Yang - Proceedings of the 2012 ACM SIGMOD …, 2012 - dl.acm.org
The popularity of mobile social networking services (mSNSs) is propelling more and more
businesses, especially those in retailing and marketing, into mobile and location-based …

VERDICT: Privacy-preserving authentication of range queries in location-based services

H Hu, Q Chen, J Xu - 2013 IEEE 29th International Conference …, 2013 - ieeexplore.ieee.org
We demonstrate VERDICT, a location-based range query service featuring the privacy-
preserving authentication capability. VERDICT adopts the common data-as-a-service …

Authenticating top-k queries in location-based services with confidentiality

Q Chen, H Hu, J Xu - Proceedings of the VLDB Endowment, 2013 - dl.acm.org
State-of-the-art location-based services (LBSs) involve data owners, requesting clients, and
service providers. As LBSs become new business opportunities, there is an increasing …

Query integrity assurance of location-based services accessing outsourced spatial databases

WS Ku, L Hu, C Shahabi, H Wang - … , SSTD 2009 Aalborg, Denmark, July 8 …, 2009 - Springer
Outsourcing data to third party data providers is becoming a common practice for data
owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the …

Spatial query integrity with voronoi neighbors

L Hu, WS Ku, S Bakiras… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
With the popularity of location-based services and the abundant usage of smart phones and
GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the …

Privacy-preserving k nearest neighbor query with authentication on road networks

S Yang, S Tang, X Zhang - Journal of Parallel and Distributed Computing, 2019 - Elsevier
Abstract k nearest neighbor (k NN) queries are frequently used in location-based services
(LBSs), by which we wish to get k closest points of interest (POIs) given a certain point. Since …

[HTML][HTML] User location privacy protection mechanism for location-based services

Y He, J Chen - Digital communications and networks, 2021 - Elsevier
With the rapid development of the Internet of Things (IoT), Location-Based Services (LBS)
are becoming more and more popular. However, for the users being served, how to protect …

[PDF][PDF] AES-route server model for location based services in road networks

MS Alrahhal, MU Ashraf, A Abesen… - International Journal Of …, 2017 - researchgate.net
(LBS), within the mobile computing domain, has enabled users to receive accurate points of
interest (POI) to their geo-tagged queries. While location-based services provide rich …

Guaranteeing the authenticity of location information

AIGT Ferreres, BR Alvarez… - IEEE Pervasive …, 2008 - ieeexplore.ieee.org
Location authentication is a young security requirement that has recently arisen in
ubiquitous computing applications. During the last decade, researchers have proposed …

Authentication of moving top-k spatial keyword queries

D Wu, B Choi, J Xu, CS Jensen - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
A moving top-spatial keyword (M SK) query, which takes into account a continuously moving
query location, enables a mobile client to be continuously aware of the top-spatial web …