A trajectory privacy-preserving scheme based on query exchange in mobile social networks
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A trajectory privacy-preserving scheme based on query exchange in mobile social networks
Authors
Keywords
Location-based service, Trajectory privacy, Mobile social networks, Query exchange, Private matching
Journal
SOFT COMPUTING
Volume -, Issue -, Pages -
Publisher
Springer Nature
Online
2017-06-12
DOI
10.1007/s00500-017-2676-6
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks
- (2018) Xi Xiao et al. Future Generation Computer Systems-The International Journal of eScience
- Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
- (2017) Entao Luo et al. Future Generation Computer Systems-The International Journal of eScience
- A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
- (2016) Saru Kumari et al. Future Generation Computer Systems-The International Journal of eScience
- Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model
- (2016) Yingpeng Sang et al. IEEE Transactions on Information Forensics and Security
- Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
- (2016) Xun Yi et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
- (2016) Xinghua Li et al. SOFT COMPUTING
- User-Defined Privacy Grid System for Continuous Location-Based Services
- (2015) Roman Schlegel et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Attack-Resilient Mix-zones over Road Networks: Architecture and Algorithms
- (2015) Balaji Palanisamy et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Long-term location privacy protection for location-based services in mobile cloud computing
- (2015) Feilong Tang et al. SOFT COMPUTING
- Social media as sensor in real world: movement trajectory detection with microblog
- (2015) Xueqin Sui et al. SOFT COMPUTING
- Using multi-objective metaheuristics for the optimal selection of positioning systems
- (2015) Massimo Ficco et al. SOFT COMPUTING
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Hiding in the Mobile Crowd: LocationPrivacy through Collaboration
- (2014) IEEE Transactions on Dependable and Secure Computing
- A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection
- (2014) Ren-Hung Hwang et al. IEEE Transactions on Services Computing
- TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
- (2013) Sheng Gao et al. IEEE Transactions on Information Forensics and Security
- Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
- (2011) Xiao Pan et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- A scalable encryption scheme for multi-privileged group communications
- (2011) Guojun Wang et al. JOURNAL OF SUPERCOMPUTING
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started