Peng et al., 2020 - Google Patents
A User‐Defined Location‐Sharing Scheme with Efficiency and Privacy in Mobile Social NetworksPeng et al., 2020
View PDF- Document ID
- 3923182595397166896
- Author
- Peng T
- Liu J
- Wang G
- Liu Q
- Chen J
- Zhu J
- Publication year
- Publication venue
- Scientific Programming
External Links
Snippet
The popularity of the modern smart devices and mobile social networks (MSNs) brings mobile users better experiences and services by taking advantage of location‐aware capabilities. Location sharing, as an important function of MSNs, has attracted attention with …
- 238000001514 detection method 0 abstract description 42
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Location-sharing systems with enhanced privacy in mobile online social networks | |
Puttaswamy et al. | Preserving location privacy in geosocial applications | |
Calderoni et al. | Location privacy without mutual trust: The spatial Bloom filter | |
Peng et al. | Multidimensional privacy preservation in location-based services | |
Deverajan et al. | Public key encryption with equality test for Industrial Internet of Things system in cloud computing | |
Gao et al. | LIP‐PA: A Logistics Information Privacy Protection Scheme with Position and Attribute‐Based Access Control on Mobile Devices | |
Liu et al. | N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks | |
Li et al. | MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks. | |
Li et al. | PROS: A privacy-preserving route-sharing service via vehicular fog computing | |
Zhang et al. | Secure hitch in location based social networks | |
Zhang et al. | An efficient privacy-preserving multi-keyword query scheme in location based services | |
Zhang et al. | A trajectory privacy-preserving scheme based on transition matrix and caching for IIoT | |
Zhang et al. | Fully Constant‐Size CP‐ABE with Privacy‐Preserving Outsourced Decryption for Lightweight Devices in Cloud‐Assisted IoT | |
Sazdar et al. | Privacy preserving in indoor fingerprint localization and radio map expansion | |
Peng et al. | A User‐Defined Location‐Sharing Scheme with Efficiency and Privacy in Mobile Social Networks | |
Ou et al. | An Efficient and Privacy‐Preserving Multiuser Cloud‐Based LBS Query Scheme | |
Lee et al. | A searchable hierarchical conditional proxy re-encryption scheme for cloud storage services | |
Rajarajeswari et al. | Data confidentiality and privacy in cloud computing | |
Shahid et al. | Delay‐aware privacy‐preserving location‐based services under spatiotemporal constraints | |
Natgunanathan et al. | Smart-area-selection based location privacy enhancement | |
Wang et al. | Fine‐Grained Task Access Control System for Mobile Crowdsensing | |
Tang et al. | Verifiable mobile online social network privacy‐preserving location sharing scheme | |
Wang et al. | On location privacy in fingerprinting-based indoor positioning system: An encryption approach | |
Suntaxi et al. | Preserving secrecy in mobile social networks | |
Mohaisen et al. | Privacy in location based services: Primitives toward the solution |