Secure collaboration in global design and supply chain environment: Problem analysis and literature review

Y Zeng, L Wang, X Deng, X Cao, N Khundker - Computers in industry, 2012 - Elsevier
Increasing global competition has led to massive outsourcing of manufacturing businesses.
Such outsourcing practices require effective collaborations between focal manufacturers …

[HTML][HTML] On content-based recommendation and user privacy in social-tagging systems

S Puglisi, J Parra-Arnau, J Forné… - Computer Standards & …, 2015 - Elsevier
Recommendation systems and content-filtering approaches based on annotations and
ratings essentially rely on users expressing their preferences and interests through their …

Measuring the privacy of user profiles in personalized information systems

J Parra-Arnau, D Rebollo-Monedero, J Forné - Future Generation …, 2014 - Elsevier
Personalized information systems are information-filtering systems that endeavor to tailor
information-exchange functionality to the specific interests of their users. The ability of these …

Optimized query forgery for private information retrieval

D Rebollo-Monedero, J Forné - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
We present a mathematical formulation for the optimization of query forgery for private
information retrieval, in the sense that the privacy risk is minimized for a given traffic and …

A user collaboration privacy protection scheme with threshold scheme and smart contract

L Zhang, D Liu, M Chen, H Li, C Wang, Y Zhang… - Information Sciences, 2021 - Elsevier
Recently, the revolution of 5G networks has promoted a wide application of wireless
technology, and then followed with the prosperity of Location-Based Service (LBS) …

Novel centralized pseudonym changing scheme for location privacy in V2X communication

A Didouh, Y El Hillali, A Rivenq, H Labiod - Energies, 2022 - mdpi.com
Vehicular ad hoc networks allow vehicles to share their information for the safety and
efficiency of traffic purposes. However, information sharing can threaten the driver's privacy …

Query profile obfuscation by means of optimal query exchange between users

D Rebollo-Monedero, J Forne… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We address the problem of query profile obfuscation by means of partial query exchanges
between two users, in order for their profiles of interest to appear distorted to the information …

ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs

T Dargahi, M Ambrosin, M Conti, N Asokan - Computer Communications, 2016 - Elsevier
The increasing use of mobile devices, along with advances in telecommunication systems,
increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact …

User privacy protection for a mobile commerce alliance

C Piao, X Li, X Pan, C Zhang - Electronic Commerce Research and …, 2016 - Elsevier
The risk of privacy disclosure in mobile commerce has received increasing attention
worldwide. Although many papers related to information privacy and privacy-preserving …

Privacy-enhanced architecture for smart metering

F Gómez Mármol, C Sorge, R Petrlic, O Ugus… - International journal of …, 2013 - Springer
The recent deployment of smart grids promises to bring numerous advantages in terms of
energy consumption reduction in both homes and businesses. A more transparent and …