2015 IEEE International Conference on Communications (ICC) 2015
DOI: 10.1109/icc.2015.7249500
|View full text |Cite
|
Sign up to set email alerts
|

PAPERS: Private and Precise Range Search for Location Based Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…According to D. Chen et al, Location Based Service (LBS) are becoming more popular on smartphones [34]. One of the common LBS is a range search.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…According to D. Chen et al, Location Based Service (LBS) are becoming more popular on smartphones [34]. One of the common LBS is a range search.…”
Section: Related Workmentioning
confidence: 99%
“…The user can encrypt her location using their method, which uses homomorphic encryption, and the LBS server can calculate distances using the ciphertext. The POIs within the defined range are precisely what LBS returns as results in this manner, and LBS gains no knowledge of the user's actual location [34].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Homomorphic Encryption for privacy protection is a research hotspot, which can prevent the disclosure of users' information and achieve a more stringent privacy protection. For example, in paper [18], the POI (i.e., the point of interest) could be calculated by LBSP without actually knowing users' locations. The BV Homomorphic Encryption (BVHE) was used in paper [8] to calculate users' request service vector in aggregation process.…”
Section: Technologies Of Lbs Privacy Preservationmentioning
confidence: 99%
“…In recent years, domestic and foreign researchers and institutions have widespread attention on location-based privacy preservation; increasingly in-depth studies are carried out in location-based privacy. Besides the above-described location privacy preserving technologies, there are a wealth of methods such as location data randomization [32], fuzzification of space or time data [33,34], methods based on strategies and encryption [35][36][37], and sensitive semantic based security anonymity mechanism [33,[38][39][40].…”
Section: Related Workmentioning
confidence: 99%