Journal articles on the topic 'Location- Privacy control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Location- Privacy control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yunxiang, Zhang, and Wang Bin. "Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection." Wireless Communications and Mobile Computing 2023 (January 30, 2023): 1–8. http://dx.doi.org/10.1155/2023/4792248.
Full textPeng, Tao, Qin Liu, and Guojun Wang. "Enhanced Location Privacy Preserving Scheme in Location-Based Services." IEEE Systems Journal 11, no. 1 (March 2017): 219–30. http://dx.doi.org/10.1109/jsyst.2014.2354235.
Full textZhu, Liang, Xiaowei Liu, Zhiyong Jing, Liping Yu, Zengyu Cai, and Jianwei Zhang. "Knowledge-Driven Location Privacy Preserving Scheme for Location-Based Social Networks." Electronics 12, no. 1 (December 24, 2022): 70. http://dx.doi.org/10.3390/electronics12010070.
Full textYang, Guangcan, Shoushan Luo, Yang Xin, Hongliang Zhu, Jingkai Wang, Mingzhen Li, and Yunfeng Wang. "A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks." Applied Sciences 10, no. 23 (November 25, 2020): 8402. http://dx.doi.org/10.3390/app10238402.
Full textPerusco, Laura, and Katina Michael. "Control, trust, privacy, and security: evaluating location-based services." IEEE Technology and Society Magazine 26, no. 1 (2007): 4–16. http://dx.doi.org/10.1109/mtas.2007.335564.
Full textLuceri, Luca, Davide Andreoletti, Massimo Tornatore, Torsten Braun, and Silvia Giordano. "Measurement and control of geo-location privacy on Twitter." Online Social Networks and Media 17 (May 2020): 100078. http://dx.doi.org/10.1016/j.osnem.2020.100078.
Full textChu, Xiang, Jun Liu, Daqing Gong, and Rui Wang. "Preserving Location Privacy in Spatial Crowdsourcing Under Quality Control." IEEE Access 7 (2019): 155851–59. http://dx.doi.org/10.1109/access.2019.2949409.
Full textQi He, Dapeng Wu, and P. Khosla. "The quest for personal control over mobile location privacy." IEEE Communications Magazine 42, no. 5 (May 2004): 130–36. http://dx.doi.org/10.1109/mcom.2004.1299356.
Full textGóes, Rômulo Meira, Blake C. Rawlings, Nicholas Recker, Gregory Willett, and Stéphane Lafortune. "Demonstration of Indoor Location Privacy Enforcement using Obfuscation." IFAC-PapersOnLine 51, no. 7 (2018): 145–51. http://dx.doi.org/10.1016/j.ifacol.2018.06.293.
Full textXu, Chuan, Li Luo, Yingyi Ding, Guofeng Zhao, and Shui Yu. "Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks." IEEE Wireless Communications Letters 9, no. 10 (October 2020): 1633–37. http://dx.doi.org/10.1109/lwc.2020.2999524.
Full textZheng, Lijuan, Linhao Zhang, Meng Cui, Ning Cao, Jianrui Ding, Leul Yalemshet, Tsepo Nyakonda, and Shepard Musasike. "The Research of Mobile Location Privacy Protection Access Control Method Based on Game Theory." Wireless Communications and Mobile Computing 2018 (December 12, 2018): 1–9. http://dx.doi.org/10.1155/2018/1847890.
Full textXie, Junqing, and Shuai Wang. "A unified location sharing service with end user privacy control." Bell Labs Technical Journal 16, no. 2 (August 26, 2011): 5–20. http://dx.doi.org/10.1002/bltj.20499.
Full textTomasin, Stefano, Marco Centenaro, Gonzalo Seco-Granados, Stefan Roth, and Aydin Sezgin. "Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond." Sensors 21, no. 15 (July 30, 2021): 5176. http://dx.doi.org/10.3390/s21155176.
Full textLi, Yuancheng, Pan Zhang, and Yimeng Wang. "The Location Privacy Protection of Electric Vehicles with Differential Privacy in V2G Networks." Energies 11, no. 10 (October 1, 2018): 2625. http://dx.doi.org/10.3390/en11102625.
Full textSchade, Michael, Rico Piehler, Claudius Warwitz, and Christoph Burmann. "Increasing consumers’ intention to use location-based advertising." Journal of Product & Brand Management 27, no. 6 (September 17, 2018): 661–69. http://dx.doi.org/10.1108/jpbm-06-2017-1498.
Full textKim, Jongwook, and Byungjin Lim. "Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability." Electronics 12, no. 4 (February 12, 2023): 917. http://dx.doi.org/10.3390/electronics12040917.
Full textXing, Ling, Dexin Zhang, Honghai Wu, Huahong Ma, and Xiaohui Zhang. "Distributed K-Anonymous Location Privacy Protection Algorithm Based on Interest Points and User Social Behavior." Electronics 12, no. 11 (May 29, 2023): 2446. http://dx.doi.org/10.3390/electronics12112446.
Full textXia, Xiu-Feng, Miao Jiang, Xiang-Yu Liu, and Chuan-Yu Zong. "Location-Visiting Characteristics Based Privacy Protection of Sensitive Relationships." Electronics 11, no. 8 (April 12, 2022): 1214. http://dx.doi.org/10.3390/electronics11081214.
Full textXu, Heng. "Locus of Control and Location Privacy: An Empirical Study in Singapore." Journal of Global Information Technology Management 13, no. 3 (July 2010): 63–87. http://dx.doi.org/10.1080/1097198x.2010.10856520.
Full textBaseri, Yaser, Abdelhakim Hafid, and Soumaya Cherkaoui. "Privacy preserving fine-grained location-based access control for mobile cloud." Computers & Security 73 (March 2018): 249–65. http://dx.doi.org/10.1016/j.cose.2017.10.014.
Full textMagkos, Emmanouil. "Cryptographic Approaches for Privacy Preservation in Location-Based Services." International Journal of Information Technologies and Systems Approach 4, no. 2 (July 2011): 48–69. http://dx.doi.org/10.4018/jitsa.2011070104.
Full textTošić, Aleksandar, Niki Hrovatin, and Jernej Vičič. "A WSN Framework for Privacy Aware Indoor Location." Applied Sciences 12, no. 6 (March 21, 2022): 3204. http://dx.doi.org/10.3390/app12063204.
Full textZhang, Xueqin, Qianru Zhou, Chunhua Gu, and Liangxiu Han. "The Location Privacy Preserving of Social Network Based on RCCAM Access Control." IETE Technical Review 35, sup1 (September 6, 2018): 68–75. http://dx.doi.org/10.1080/02564602.2018.1507767.
Full textKim, Junghwan, and Mei-Po Kwan. "An Examination of People’s Privacy Concerns, Perceptions of Social Benefits, and Acceptance of COVID-19 Mitigation Measures That Harness Location Information: A Comparative Study of the U.S. and South Korea." ISPRS International Journal of Geo-Information 10, no. 1 (January 12, 2021): 25. http://dx.doi.org/10.3390/ijgi10010025.
Full textLi, Yuxi, Fucai Zhou, Yue Ge, and Zifeng Xu. "Privacy-Enhancing k-Nearest Neighbors Search over Mobile Social Networks." Sensors 21, no. 12 (June 9, 2021): 3994. http://dx.doi.org/10.3390/s21123994.
Full textThompson, London, and Csilla Farkas. "PRIVACY AND SECURITY FOR TELEHEALTH DEVICES." Innovation in Aging 3, Supplement_1 (November 2019): S836. http://dx.doi.org/10.1093/geroni/igz038.3081.
Full textKhan, Shawal, Ishita Sharma, Mazzamal Aslam, Muhammad Zahid Khan, and Shahzad Khan. "Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey." Future Internet 13, no. 4 (April 10, 2021): 96. http://dx.doi.org/10.3390/fi13040096.
Full textSong, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang, and Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing." Electronics 12, no. 14 (July 10, 2023): 3016. http://dx.doi.org/10.3390/electronics12143016.
Full textCui, Longyin, and Xiwei Wang. "A Cascade Framework for Privacy-Preserving Point-of-Interest Recommender System." Electronics 11, no. 7 (April 6, 2022): 1153. http://dx.doi.org/10.3390/electronics11071153.
Full textZeng, Mengjia, Zhaolin Cheng, Xu Huang, and Bo Zheng. "Spatial Crowdsourcing Quality Control Model Based on K-Anonymity Location Privacy Protection and ELM Spammer Detection." Mobile Information Systems 2019 (February 4, 2019): 1–10. http://dx.doi.org/10.1155/2019/2723686.
Full textArana, O., F. Garcia, and J. Gomez. "Analysis of the effectiveness of transmission power control as a location privacy technique." Computer Networks 163 (November 2019): 106880. http://dx.doi.org/10.1016/j.comnet.2019.106880.
Full textLi, Zhidan, Wenmin Li, QiaoYan Wen, Jiageng Chen, Wei Yin, and Kaitai Liang. "An efficient blind filter: Location privacy protection and the access control in FinTech." Future Generation Computer Systems 100 (November 2019): 797–810. http://dx.doi.org/10.1016/j.future.2019.04.026.
Full textLohan, Elena Simona, Viktoriia Shubina, and Dragoș Niculescu. "Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications." Sensors 22, no. 2 (January 17, 2022): 687. http://dx.doi.org/10.3390/s22020687.
Full textZidani, Ferroudja, Fouzi Semchedine, and Marwane Ayaida. "Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs." Computers & Electrical Engineering 71 (October 2018): 359–71. http://dx.doi.org/10.1016/j.compeleceng.2018.07.040.
Full textBalaji, T. S., Robert H. Miller, Clyde C. Heppner, and R. Brian Landers. "Privacy Rules: Method and System for Conveying Location-Granularity Preferences with Location-Based Service Requests." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 4 (September 2005): 633–36. http://dx.doi.org/10.1177/154193120504900407.
Full textKim, JeongYeon. "Protecting Metadata of Access Indicator and Region of Interests for Image Files." Security and Communication Networks 2020 (January 22, 2020): 1–10. http://dx.doi.org/10.1155/2020/4836109.
Full textWang, Na, Junsong Fu, Jiwen Zeng, and Bharat K. Bhargava. "Source-location privacy full protection in wireless sensor networks." Information Sciences 444 (May 2018): 105–21. http://dx.doi.org/10.1016/j.ins.2018.02.064.
Full textNarain, Sashank, and Guevara Noubir. "Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (April 1, 2019): 66–87. http://dx.doi.org/10.2478/popets-2019-0020.
Full textYan, Liang, Hao Wang, Zhaokun Wang, Tingting Wu, Wandi Fu, and Xu Zhang. "Differentially Private Timestamps Publishing in Trajectory." Electronics 12, no. 2 (January 10, 2023): 361. http://dx.doi.org/10.3390/electronics12020361.
Full textYang, Jianxi, Manoranjan Dash, and Sin G. Teo. "PPTPF: Privacy-Preserving Trajectory Publication Framework for CDR Mobile Trajectories." ISPRS International Journal of Geo-Information 10, no. 4 (April 6, 2021): 224. http://dx.doi.org/10.3390/ijgi10040224.
Full textZou, Shihong, Jinwen Xi, Honggang Wang, and Guoai Xu. "CrowdBLPS: A Blockchain-Based Location-Privacy-Preserving Mobile Crowdsensing System." IEEE Transactions on Industrial Informatics 16, no. 6 (June 2020): 4206–18. http://dx.doi.org/10.1109/tii.2019.2957791.
Full textBoudjit, Saadi, Benamar Kadri, and Leila Benarous. "Camouflage-based location privacy preserving scheme in vehicular ad hoc networks." International Journal of Vehicle Information and Communication Systems 8, no. 3 (2023): 217–36. http://dx.doi.org/10.1504/ijvics.2023.10058397.
Full textBenarous, Leila, Benamar Kadri, and Saadi Boudjit. "Camouflage-based location privacy preserving scheme in vehicular ad hoc networks." International Journal of Vehicle Information and Communication Systems 8, no. 3 (2023): 217–36. http://dx.doi.org/10.1504/ijvics.2023.132926.
Full textZeng, Wen, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, and Isabel Wagner. "How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems." EAI Endorsed Transactions on Cloud Systems 6, no. 18 (September 7, 2020): 165236. http://dx.doi.org/10.4108/eai.13-7-2018.165236.
Full textHuang, Jianwei, Mei-Po Kwan, and Junghwan Kim. "How Culture and Sociopolitical Tensions Might Influence People’s Acceptance of COVID-19 Control Measures That Use Individual-Level Georeferenced Data." ISPRS International Journal of Geo-Information 10, no. 7 (July 20, 2021): 490. http://dx.doi.org/10.3390/ijgi10070490.
Full textHe, Peicong, Yang Xin, Bochuan Hou, and Yixian Yang. "PKGS: A Privacy-Preserving Hitchhiking Task Assignment Scheme for Spatial Crowdsourcing." Electronics 12, no. 15 (August 2, 2023): 3318. http://dx.doi.org/10.3390/electronics12153318.
Full textTakbiri, Nazanin, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel, and Hossein Pishro-Nik. "Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms." IEEE Wireless Communications Letters 9, no. 11 (November 2020): 2005–9. http://dx.doi.org/10.1109/lwc.2020.3011361.
Full textLi, Weihao, Chen Li, and Yeli Geng. "APS: Attribute-aware privacy-preserving scheme in location-based services." Information Sciences 527 (July 2020): 460–76. http://dx.doi.org/10.1016/j.ins.2019.02.025.
Full textDidouh, Ahmed, Yassin El Hillali, Atika Rivenq, and Houda Labiod. "Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication." Energies 15, no. 3 (January 18, 2022): 692. http://dx.doi.org/10.3390/en15030692.
Full textWang, Gui Chao, Ai Li Zhang, and Yong Zhen Li. "Secure Authentication Protocol of RFID System Based on Access Control." Advanced Engineering Forum 6-7 (September 2012): 1072–77. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1072.
Full text