Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z **ao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Geo-indistinguishability: Differential privacy for location-based systems

ME Andrés, NE Bordenabe, K Chatzikokolakis… - Proceedings of the …, 2013 - dl.acm.org
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

LSTM-TrajGAN: A deep learning approach to trajectory privacy protection

J Rao, S Gao, Y Kang, Q Huang - arxiv preprint arxiv:2006.10521, 2020 - arxiv.org
The prevalence of location-based services contributes to the explosive growth of individual-
level trajectory data and raises public concerns about privacy issues. In this research, we …

Pseudonym schemes in vehicular networks: A survey

J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2014 - ieeexplore.ieee.org
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

S Zhang, B Hu, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Location-based services have become prevalent and the risk of location privacy leakage
increases. Most existing schemes use third-party-based or third-party-free system …

Achieving k-anonymity in privacy-aware location-based services

B Niu, Q Li, X Zhu, G Cao, H Li - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …

Smart city IoT platform respecting GDPR privacy and security aspects

C Badii, P Bellini, A Difino, P Nesi - IEEE access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) paradigm enables computation and communication among tools
that everyone uses daily. The vastness and heterogeneity of devices and their composition …