The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Protecting the location privacy is still one of the main challenges in Vehicular Ad-hoc Networks(VANETs). Although, standardization bodies such as IEEE and ETSI have adopted the pseudonymous scheme as a solution to this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose a complete and efficient pseudonym management and changing scheme based on...
In online social networks (OSNs), individual users have a strong desire to expand their social networks through OSN activities and try to maximize the benefits from the social relationships, called social capital. However, with a large-scale social network, their privacy rights have been significantly intruded by adversarial users that perform social attacks including false / illegal private information...
Mobile location-based services (LBSs) empowered by mobile crowdsourcing provide users with context- aware intelligent services based on user locations. As smartphones are capable of collecting and disseminating massive user location-embedded sensing information, privacy preservation for mobile users has become a crucial issue. This paper proposes a metric called privacy exposure to quantify the notion...
This paper studies privacy-preserving for downlink transmission in multiuser relay systems, where a source communicates with multiple users via a relay employing the amplify-and-forward (AF) protocol. At any scheduling unit, only one user (desired user) is selected to receive the source information, and the other users (undesired users) are viewed as potential eavesdroppers due to the broadcast nature...
In applications of Wireless Sensor Networks (WSNs), all data packets are directed towards a single base-station (BS) over multi-hop routes. The BS is usually responsible for processing the collected data and interfacing the WSN to remote users. The continuous flow of packets towards the BS enables the adversary to analyze the traffic and uncover the BS position. In this paper, we present a technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.