[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Peng et al., 2020 - Google Patents

A User‐Defined Location‐Sharing Scheme with Efficiency and Privacy in Mobile Social Networks

Peng et al., 2020

View PDF @Full View
Document ID
3923182595397166896
Author
Peng T
Liu J
Wang G
Liu Q
Chen J
Zhu J
Publication year
Publication venue
Scientific Programming

External Links

Snippet

The popularity of the modern smart devices and mobile social networks (MSNs) brings mobile users better experiences and services by taking advantage of location‐aware capabilities. Location sharing, as an important function of MSNs, has attracted attention with …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Li et al. Location-sharing systems with enhanced privacy in mobile online social networks
Puttaswamy et al. Preserving location privacy in geosocial applications
Calderoni et al. Location privacy without mutual trust: The spatial Bloom filter
Peng et al. Multidimensional privacy preservation in location-based services
Deverajan et al. Public key encryption with equality test for Industrial Internet of Things system in cloud computing
Gao et al. LIP‐PA: A Logistics Information Privacy Protection Scheme with Position and Attribute‐Based Access Control on Mobile Devices
Liu et al. N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks
Li et al. MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.
Li et al. PROS: A privacy-preserving route-sharing service via vehicular fog computing
Zhang et al. Secure hitch in location based social networks
Zhang et al. An efficient privacy-preserving multi-keyword query scheme in location based services
Zhang et al. A trajectory privacy-preserving scheme based on transition matrix and caching for IIoT
Zhang et al. Fully Constant‐Size CP‐ABE with Privacy‐Preserving Outsourced Decryption for Lightweight Devices in Cloud‐Assisted IoT
Sazdar et al. Privacy preserving in indoor fingerprint localization and radio map expansion
Peng et al. A User‐Defined Location‐Sharing Scheme with Efficiency and Privacy in Mobile Social Networks
Ou et al. An Efficient and Privacy‐Preserving Multiuser Cloud‐Based LBS Query Scheme
Lee et al. A searchable hierarchical conditional proxy re-encryption scheme for cloud storage services
Rajarajeswari et al. Data confidentiality and privacy in cloud computing
Shahid et al. Delay‐aware privacy‐preserving location‐based services under spatiotemporal constraints
Natgunanathan et al. Smart-area-selection based location privacy enhancement
Wang et al. Fine‐Grained Task Access Control System for Mobile Crowdsensing
Tang et al. Verifiable mobile online social network privacy‐preserving location sharing scheme
Wang et al. On location privacy in fingerprinting-based indoor positioning system: An encryption approach
Suntaxi et al. Preserving secrecy in mobile social networks
Mohaisen et al. Privacy in location based services: Primitives toward the solution