Search
Search Results
-
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles
Position fuzzy algorithm has certain security, but it doesn’t fit well with the actual situation of the Internet of vehicles in road network. So, in... -
Achieving Privacy Preservation Constraints in Missing-Value Datasets
Privacy violation issues must be taken into consideration when datasets are released for public use. To address these issues, there are various...
-
A systematic literature review on wearable health data publishing under differential privacy
Wearable devices generate different types of physiological data about the individuals. These data can provide valuable insights for medical...
-
Tor network anonymity evaluation based on node anonymity
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...
-
Smart Anonymity: a mechanism for recommending data anonymization algorithms based on data profiles for IoT environments
The internet of things (IoT) has seen rapid expansion, but this growth brings significant privacy challenges due to the large amounts of data...
-
Application of Computer Simulation to the Anonymization of Personal Data: Synthesis-Based Anonymization Model and Algorithm
AbstractThis paper describes the second part of our study devoted to automated anonymization of personal data. The overview and analysis of research...
-
Application of Computer Simulation to the Anonymization of Personal Data: State-of-the-Art and Key Points
AbstractThe first part of the study of the automated processing of personal data for the purpose of their anonymization and analysis is presented....
-
An elliptic curve-based lightweight mutual authentication scheme for secure communication in smart grids
The energy balance between consumers and the smart grid is preserved using data transferred from the smart grids' devices to either the utility...
-
Activity-based payments: alternative (anonymous) online payment model
Electronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment...
-
Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health
The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of...
-
Manipulable, reversible and diversified de-identification via face identity disentanglement
Face de-identification has always been a focal point in privacy-preserving research. Most existing de-identification methods focus only on the...
-
Proxy signature-based role delegation scheme: formal analysis and simulation
In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature...
-
A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries
In the continuous location-based service (LBS) queries, the trajectory k-anonymity method that incorporates user’s moving trend is becoming popular... -
A General Algorithm for k-anonymity on Dynamic Databases
In this work we present an algorithm for k-anonymization of datasets that are changing over time. It is intended for preventing identity disclosure... -
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...
-
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks
There are two popular location-based service (LBS) applications: searching k-nearest neighbor Points of Interests (kNN POIs) and finding Nearby... -
Threshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...
-
Hilbert curves-based location privacy technique for vehicular cloud networks
Location privacy (LP) plays an important role in location-based services (LBS) offered by different service providers. Many applications request...
-
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval
The advent of blockchain technology has revolutionized Internet-of-Thing (IoT) systems offering immutable and transparent ledger mechanisms. However,...