Secure collaboration in global design and supply chain environment: Problem analysis and literature review
Increasing global competition has led to massive outsourcing of manufacturing businesses.
Such outsourcing practices require effective collaborations between focal manufacturers …
Such outsourcing practices require effective collaborations between focal manufacturers …
[HTML][HTML] On content-based recommendation and user privacy in social-tagging systems
Recommendation systems and content-filtering approaches based on annotations and
ratings essentially rely on users expressing their preferences and interests through their …
ratings essentially rely on users expressing their preferences and interests through their …
Measuring the privacy of user profiles in personalized information systems
Personalized information systems are information-filtering systems that endeavor to tailor
information-exchange functionality to the specific interests of their users. The ability of these …
information-exchange functionality to the specific interests of their users. The ability of these …
Optimized query forgery for private information retrieval
We present a mathematical formulation for the optimization of query forgery for private
information retrieval, in the sense that the privacy risk is minimized for a given traffic and …
information retrieval, in the sense that the privacy risk is minimized for a given traffic and …
A user collaboration privacy protection scheme with threshold scheme and smart contract
Recently, the revolution of 5G networks has promoted a wide application of wireless
technology, and then followed with the prosperity of Location-Based Service (LBS) …
technology, and then followed with the prosperity of Location-Based Service (LBS) …
Novel centralized pseudonym changing scheme for location privacy in V2X communication
Vehicular ad hoc networks allow vehicles to share their information for the safety and
efficiency of traffic purposes. However, information sharing can threaten the driver's privacy …
efficiency of traffic purposes. However, information sharing can threaten the driver's privacy …
Query profile obfuscation by means of optimal query exchange between users
We address the problem of query profile obfuscation by means of partial query exchanges
between two users, in order for their profiles of interest to appear distorted to the information …
between two users, in order for their profiles of interest to appear distorted to the information …
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs
The increasing use of mobile devices, along with advances in telecommunication systems,
increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact …
increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact …
User privacy protection for a mobile commerce alliance
C Piao, X Li, X Pan, C Zhang - Electronic Commerce Research and …, 2016 - Elsevier
The risk of privacy disclosure in mobile commerce has received increasing attention
worldwide. Although many papers related to information privacy and privacy-preserving …
worldwide. Although many papers related to information privacy and privacy-preserving …
Privacy-enhanced architecture for smart metering
The recent deployment of smart grids promises to bring numerous advantages in terms of
energy consumption reduction in both homes and businesses. A more transparent and …
energy consumption reduction in both homes and businesses. A more transparent and …