IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8056976
|View full text |Cite
|
Sign up to set email alerts
|

Location-privacy-aware review publication mechanism for local business service systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
78
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 115 publications
(78 citation statements)
references
References 21 publications
0
78
0
Order By: Relevance
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Multicast authentication schemes such as TELSA, Biba, HORS, and OTS [3,23] were proposed for authenticating entities such as utility companies and control centers when messages or control commands are sent to smart meters. To authenticate smart meters or other smart devices to the control center, batch verification schemes [24][25][26][27] were developed to improve the efficiency. Data aggregation based on homomorphic encryption, secret sharing, and other technologies [13,25,26] was designed to aggregate customers' data and to protect their privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Even more, due to the complexity and diversity of fog nodes, user privacy in a fog network can easily be disclosure. For example, more than 400, 000 electronic eyes in Beijing may lead to privacy leakage (e.g., vehicle location information) by data sharing in vehicular ad hoc networks (VANETs) [6][7][8]. Similarly, we can also gain illegal access to personal health datasets gathered from various sensors of physical sign in body sensor networks (BSNs) and publish these private data without permission [9][10][11].…”
Section: Introductionmentioning
confidence: 99%