Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Ayong YE"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-17 (2024)
Abstract In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently. However, we investig
Externí odkaz:
https://doaj.org/article/65723386ed6b42a590311031cadde369
Publikováno v:
Tongxin xuebao, Vol 41, Pp 123-133 (2020)
To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation
Externí odkaz:
https://doaj.org/article/71f8a94ec906471b9af26ed564a1dc98
Publikováno v:
IEEE Access, Vol 8, Pp 39768-39780 (2020)
WLAN-based localization is widely adopted for mobile positioning, which is the prerequisite for location based services and more. However, the existing positioning systems are vulnerable to location spoofing attacks, which may bring major privacy con
Externí odkaz:
https://doaj.org/article/eeabbac4977e4f56a841c2bc42096ce5
Publikováno v:
IEEE Access, Vol 8, Pp 184965-184975 (2020)
The increasing abundance of data in the trajectories of personal movement opens up new opportunities for analyzing and mining human mobility. But the inherent personal information in the data raises the privacy concern. In this paper, the trajectorie
Externí odkaz:
https://doaj.org/article/1f0203ccf5c24e01933631376ec132c5
Publikováno v:
网络与信息安全学报, Vol 5, Pp 52-62 (2019)
Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles,which may lead to vehicle trajectory privacy leakage.To address the privacy problem,trajectory privacy protection mechanism of obfuscati
Externí odkaz:
https://doaj.org/article/0a0c60a6c74f4b97a39e6a532b879a71
Publikováno v:
网络与信息安全学报, Vol 4, Pp 55-61 (2018)
The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Int
Externí odkaz:
https://doaj.org/article/9e783c0fc3de486196869ac6d753040b
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
The position of RFID-tagged objects in sensor networks is becoming an important feature for ubiquitous computing applications. In this work, we develop an improved positioning algorithm for RFID-tagged objects. Compared with the VIRE algorithm, we ap
Externí odkaz:
https://doaj.org/article/251e1f85e3d04dd491da7633b5aaf697
Service-Splitting-Based Privacy Protection Mechanism for Proximity Detection Supporting High Utility
Publikováno v:
IEEE Transactions on Computational Social Systems. 10:192-203
Publikováno v:
ACM Transactions on Sensor Networks. 19:1-20
To secure communications, this article presents a key extraction scheme for smart devices using ambient sounds. Specifically, it is designed for the scenario when smart devices do not have any pre-loaded secrets. Moreover, it can be implemented when
Publikováno v:
China Communications. 19:91-104