Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z **ao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

[PDF][PDF] Using social media to enhance emergency situation awareness

J Yin, A Lampert, M Cameron, B Robinson… - IEEE intelligent …, 2012 - delvalle.bphc.org
Enabling situation awareness in a given environment thus relies on being able to identify an
appropriate set of perception elements, coupled with higher-level comprehension patterns …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

Protecting location privacy: optimal strategy against localization attacks

R Shokri, G Theodorakopoulos, C Troncoso… - Proceedings of the …, 2012 - dl.acm.org
The mainstream approach to protecting the location-privacy of mobile users in location-
based services (LBSs) is to alter the users' actual locations in order to reduce the location …

Synthesizing plausible privacy-preserving location traces

V Bindschaedler, R Shokri - 2016 IEEE symposium on security …, 2016 - ieeexplore.ieee.org
Camouflaging user's actual location with fakes is a prevalent obfuscation technique for
protecting location privacy. We show that the protection mechanisms based on the existing …

Vtrack: accurate, energy-aware road traffic delay estimation using mobile phones

A Thiagarajan, L Ravindranath, K LaCurts… - Proceedings of the 7th …, 2009 - dl.acm.org
Traffic delays and congestion are a major source of inefficiency, wasted fuel, and commuter
frustration. Measuring and localizing these delays, and routing users around them, is an …

Optimal geo-indistinguishable mechanisms for location privacy

NE Bordenabe, K Chatzikokolakis… - Proceedings of the 2014 …, 2014 - dl.acm.org
We consider the geo-indistinguishability approach to location privacy, and the trade-off with
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …

ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs

J Li, H Lu, M Guizani - IEEE transactions on parallel and …, 2014 - ieeexplore.ieee.org
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both
inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be …