Artykuły w czasopismach na temat „Location- Privacy control”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Location- Privacy control”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Yunxiang, Zhang, i Wang Bin. "Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection". Wireless Communications and Mobile Computing 2023 (30.01.2023): 1–8. http://dx.doi.org/10.1155/2023/4792248.
Pełny tekst źródłaPeng, Tao, Qin Liu i Guojun Wang. "Enhanced Location Privacy Preserving Scheme in Location-Based Services". IEEE Systems Journal 11, nr 1 (marzec 2017): 219–30. http://dx.doi.org/10.1109/jsyst.2014.2354235.
Pełny tekst źródłaZhu, Liang, Xiaowei Liu, Zhiyong Jing, Liping Yu, Zengyu Cai i Jianwei Zhang. "Knowledge-Driven Location Privacy Preserving Scheme for Location-Based Social Networks". Electronics 12, nr 1 (24.12.2022): 70. http://dx.doi.org/10.3390/electronics12010070.
Pełny tekst źródłaYang, Guangcan, Shoushan Luo, Yang Xin, Hongliang Zhu, Jingkai Wang, Mingzhen Li i Yunfeng Wang. "A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks". Applied Sciences 10, nr 23 (25.11.2020): 8402. http://dx.doi.org/10.3390/app10238402.
Pełny tekst źródłaPerusco, Laura, i Katina Michael. "Control, trust, privacy, and security: evaluating location-based services". IEEE Technology and Society Magazine 26, nr 1 (2007): 4–16. http://dx.doi.org/10.1109/mtas.2007.335564.
Pełny tekst źródłaLuceri, Luca, Davide Andreoletti, Massimo Tornatore, Torsten Braun i Silvia Giordano. "Measurement and control of geo-location privacy on Twitter". Online Social Networks and Media 17 (maj 2020): 100078. http://dx.doi.org/10.1016/j.osnem.2020.100078.
Pełny tekst źródłaChu, Xiang, Jun Liu, Daqing Gong i Rui Wang. "Preserving Location Privacy in Spatial Crowdsourcing Under Quality Control". IEEE Access 7 (2019): 155851–59. http://dx.doi.org/10.1109/access.2019.2949409.
Pełny tekst źródłaQi He, Dapeng Wu i P. Khosla. "The quest for personal control over mobile location privacy". IEEE Communications Magazine 42, nr 5 (maj 2004): 130–36. http://dx.doi.org/10.1109/mcom.2004.1299356.
Pełny tekst źródłaGóes, Rômulo Meira, Blake C. Rawlings, Nicholas Recker, Gregory Willett i Stéphane Lafortune. "Demonstration of Indoor Location Privacy Enforcement using Obfuscation". IFAC-PapersOnLine 51, nr 7 (2018): 145–51. http://dx.doi.org/10.1016/j.ifacol.2018.06.293.
Pełny tekst źródłaXu, Chuan, Li Luo, Yingyi Ding, Guofeng Zhao i Shui Yu. "Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks". IEEE Wireless Communications Letters 9, nr 10 (październik 2020): 1633–37. http://dx.doi.org/10.1109/lwc.2020.2999524.
Pełny tekst źródłaZheng, Lijuan, Linhao Zhang, Meng Cui, Ning Cao, Jianrui Ding, Leul Yalemshet, Tsepo Nyakonda i Shepard Musasike. "The Research of Mobile Location Privacy Protection Access Control Method Based on Game Theory". Wireless Communications and Mobile Computing 2018 (12.12.2018): 1–9. http://dx.doi.org/10.1155/2018/1847890.
Pełny tekst źródłaXie, Junqing, i Shuai Wang. "A unified location sharing service with end user privacy control". Bell Labs Technical Journal 16, nr 2 (26.08.2011): 5–20. http://dx.doi.org/10.1002/bltj.20499.
Pełny tekst źródłaTomasin, Stefano, Marco Centenaro, Gonzalo Seco-Granados, Stefan Roth i Aydin Sezgin. "Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond". Sensors 21, nr 15 (30.07.2021): 5176. http://dx.doi.org/10.3390/s21155176.
Pełny tekst źródłaLi, Yuancheng, Pan Zhang i Yimeng Wang. "The Location Privacy Protection of Electric Vehicles with Differential Privacy in V2G Networks". Energies 11, nr 10 (1.10.2018): 2625. http://dx.doi.org/10.3390/en11102625.
Pełny tekst źródłaSchade, Michael, Rico Piehler, Claudius Warwitz i Christoph Burmann. "Increasing consumers’ intention to use location-based advertising". Journal of Product & Brand Management 27, nr 6 (17.09.2018): 661–69. http://dx.doi.org/10.1108/jpbm-06-2017-1498.
Pełny tekst źródłaKim, Jongwook, i Byungjin Lim. "Effective and Privacy-Preserving Estimation of the Density Distribution of LBS Users under Geo-Indistinguishability". Electronics 12, nr 4 (12.02.2023): 917. http://dx.doi.org/10.3390/electronics12040917.
Pełny tekst źródłaXing, Ling, Dexin Zhang, Honghai Wu, Huahong Ma i Xiaohui Zhang. "Distributed K-Anonymous Location Privacy Protection Algorithm Based on Interest Points and User Social Behavior". Electronics 12, nr 11 (29.05.2023): 2446. http://dx.doi.org/10.3390/electronics12112446.
Pełny tekst źródłaXia, Xiu-Feng, Miao Jiang, Xiang-Yu Liu i Chuan-Yu Zong. "Location-Visiting Characteristics Based Privacy Protection of Sensitive Relationships". Electronics 11, nr 8 (12.04.2022): 1214. http://dx.doi.org/10.3390/electronics11081214.
Pełny tekst źródłaXu, Heng. "Locus of Control and Location Privacy: An Empirical Study in Singapore". Journal of Global Information Technology Management 13, nr 3 (lipiec 2010): 63–87. http://dx.doi.org/10.1080/1097198x.2010.10856520.
Pełny tekst źródłaBaseri, Yaser, Abdelhakim Hafid i Soumaya Cherkaoui. "Privacy preserving fine-grained location-based access control for mobile cloud". Computers & Security 73 (marzec 2018): 249–65. http://dx.doi.org/10.1016/j.cose.2017.10.014.
Pełny tekst źródłaMagkos, Emmanouil. "Cryptographic Approaches for Privacy Preservation in Location-Based Services". International Journal of Information Technologies and Systems Approach 4, nr 2 (lipiec 2011): 48–69. http://dx.doi.org/10.4018/jitsa.2011070104.
Pełny tekst źródłaTošić, Aleksandar, Niki Hrovatin i Jernej Vičič. "A WSN Framework for Privacy Aware Indoor Location". Applied Sciences 12, nr 6 (21.03.2022): 3204. http://dx.doi.org/10.3390/app12063204.
Pełny tekst źródłaZhang, Xueqin, Qianru Zhou, Chunhua Gu i Liangxiu Han. "The Location Privacy Preserving of Social Network Based on RCCAM Access Control". IETE Technical Review 35, sup1 (6.09.2018): 68–75. http://dx.doi.org/10.1080/02564602.2018.1507767.
Pełny tekst źródłaKim, Junghwan, i Mei-Po Kwan. "An Examination of People’s Privacy Concerns, Perceptions of Social Benefits, and Acceptance of COVID-19 Mitigation Measures That Harness Location Information: A Comparative Study of the U.S. and South Korea". ISPRS International Journal of Geo-Information 10, nr 1 (12.01.2021): 25. http://dx.doi.org/10.3390/ijgi10010025.
Pełny tekst źródłaLi, Yuxi, Fucai Zhou, Yue Ge i Zifeng Xu. "Privacy-Enhancing k-Nearest Neighbors Search over Mobile Social Networks". Sensors 21, nr 12 (9.06.2021): 3994. http://dx.doi.org/10.3390/s21123994.
Pełny tekst źródłaThompson, London, i Csilla Farkas. "PRIVACY AND SECURITY FOR TELEHEALTH DEVICES". Innovation in Aging 3, Supplement_1 (listopad 2019): S836. http://dx.doi.org/10.1093/geroni/igz038.3081.
Pełny tekst źródłaKhan, Shawal, Ishita Sharma, Mazzamal Aslam, Muhammad Zahid Khan i Shahzad Khan. "Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey". Future Internet 13, nr 4 (10.04.2021): 96. http://dx.doi.org/10.3390/fi13040096.
Pełny tekst źródłaSong, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang i Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing". Electronics 12, nr 14 (10.07.2023): 3016. http://dx.doi.org/10.3390/electronics12143016.
Pełny tekst źródłaCui, Longyin, i Xiwei Wang. "A Cascade Framework for Privacy-Preserving Point-of-Interest Recommender System". Electronics 11, nr 7 (6.04.2022): 1153. http://dx.doi.org/10.3390/electronics11071153.
Pełny tekst źródłaZeng, Mengjia, Zhaolin Cheng, Xu Huang i Bo Zheng. "Spatial Crowdsourcing Quality Control Model Based on K-Anonymity Location Privacy Protection and ELM Spammer Detection". Mobile Information Systems 2019 (4.02.2019): 1–10. http://dx.doi.org/10.1155/2019/2723686.
Pełny tekst źródłaArana, O., F. Garcia i J. Gomez. "Analysis of the effectiveness of transmission power control as a location privacy technique". Computer Networks 163 (listopad 2019): 106880. http://dx.doi.org/10.1016/j.comnet.2019.106880.
Pełny tekst źródłaLi, Zhidan, Wenmin Li, QiaoYan Wen, Jiageng Chen, Wei Yin i Kaitai Liang. "An efficient blind filter: Location privacy protection and the access control in FinTech". Future Generation Computer Systems 100 (listopad 2019): 797–810. http://dx.doi.org/10.1016/j.future.2019.04.026.
Pełny tekst źródłaLohan, Elena Simona, Viktoriia Shubina i Dragoș Niculescu. "Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications". Sensors 22, nr 2 (17.01.2022): 687. http://dx.doi.org/10.3390/s22020687.
Pełny tekst źródłaZidani, Ferroudja, Fouzi Semchedine i Marwane Ayaida. "Estimation of Neighbors Position privacy scheme with an Adaptive Beaconing approach for location privacy in VANETs". Computers & Electrical Engineering 71 (październik 2018): 359–71. http://dx.doi.org/10.1016/j.compeleceng.2018.07.040.
Pełny tekst źródłaBalaji, T. S., Robert H. Miller, Clyde C. Heppner i R. Brian Landers. "Privacy Rules: Method and System for Conveying Location-Granularity Preferences with Location-Based Service Requests". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, nr 4 (wrzesień 2005): 633–36. http://dx.doi.org/10.1177/154193120504900407.
Pełny tekst źródłaKim, JeongYeon. "Protecting Metadata of Access Indicator and Region of Interests for Image Files". Security and Communication Networks 2020 (22.01.2020): 1–10. http://dx.doi.org/10.1155/2020/4836109.
Pełny tekst źródłaWang, Na, Junsong Fu, Jiwen Zeng i Bharat K. Bhargava. "Source-location privacy full protection in wireless sensor networks". Information Sciences 444 (maj 2018): 105–21. http://dx.doi.org/10.1016/j.ins.2018.02.064.
Pełny tekst źródłaNarain, Sashank, i Guevara Noubir. "Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing". Proceedings on Privacy Enhancing Technologies 2019, nr 2 (1.04.2019): 66–87. http://dx.doi.org/10.2478/popets-2019-0020.
Pełny tekst źródłaYan, Liang, Hao Wang, Zhaokun Wang, Tingting Wu, Wandi Fu i Xu Zhang. "Differentially Private Timestamps Publishing in Trajectory". Electronics 12, nr 2 (10.01.2023): 361. http://dx.doi.org/10.3390/electronics12020361.
Pełny tekst źródłaYang, Jianxi, Manoranjan Dash i Sin G. Teo. "PPTPF: Privacy-Preserving Trajectory Publication Framework for CDR Mobile Trajectories". ISPRS International Journal of Geo-Information 10, nr 4 (6.04.2021): 224. http://dx.doi.org/10.3390/ijgi10040224.
Pełny tekst źródłaZou, Shihong, Jinwen Xi, Honggang Wang i Guoai Xu. "CrowdBLPS: A Blockchain-Based Location-Privacy-Preserving Mobile Crowdsensing System". IEEE Transactions on Industrial Informatics 16, nr 6 (czerwiec 2020): 4206–18. http://dx.doi.org/10.1109/tii.2019.2957791.
Pełny tekst źródłaBoudjit, Saadi, Benamar Kadri i Leila Benarous. "Camouflage-based location privacy preserving scheme in vehicular ad hoc networks". International Journal of Vehicle Information and Communication Systems 8, nr 3 (2023): 217–36. http://dx.doi.org/10.1504/ijvics.2023.10058397.
Pełny tekst źródłaBenarous, Leila, Benamar Kadri i Saadi Boudjit. "Camouflage-based location privacy preserving scheme in vehicular ad hoc networks". International Journal of Vehicle Information and Communication Systems 8, nr 3 (2023): 217–36. http://dx.doi.org/10.1504/ijvics.2023.132926.
Pełny tekst źródłaZeng, Wen, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke i Isabel Wagner. "How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems". EAI Endorsed Transactions on Cloud Systems 6, nr 18 (7.09.2020): 165236. http://dx.doi.org/10.4108/eai.13-7-2018.165236.
Pełny tekst źródłaHuang, Jianwei, Mei-Po Kwan i Junghwan Kim. "How Culture and Sociopolitical Tensions Might Influence People’s Acceptance of COVID-19 Control Measures That Use Individual-Level Georeferenced Data". ISPRS International Journal of Geo-Information 10, nr 7 (20.07.2021): 490. http://dx.doi.org/10.3390/ijgi10070490.
Pełny tekst źródłaHe, Peicong, Yang Xin, Bochuan Hou i Yixian Yang. "PKGS: A Privacy-Preserving Hitchhiking Task Assignment Scheme for Spatial Crowdsourcing". Electronics 12, nr 15 (2.08.2023): 3318. http://dx.doi.org/10.3390/electronics12153318.
Pełny tekst źródłaTakbiri, Nazanin, Virat Shejwalkar, Amir Houmansadr, Dennis L. Goeckel i Hossein Pishro-Nik. "Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms". IEEE Wireless Communications Letters 9, nr 11 (listopad 2020): 2005–9. http://dx.doi.org/10.1109/lwc.2020.3011361.
Pełny tekst źródłaLi, Weihao, Chen Li i Yeli Geng. "APS: Attribute-aware privacy-preserving scheme in location-based services". Information Sciences 527 (lipiec 2020): 460–76. http://dx.doi.org/10.1016/j.ins.2019.02.025.
Pełny tekst źródłaDidouh, Ahmed, Yassin El Hillali, Atika Rivenq i Houda Labiod. "Novel Centralized Pseudonym Changing Scheme for Location Privacy in V2X Communication". Energies 15, nr 3 (18.01.2022): 692. http://dx.doi.org/10.3390/en15030692.
Pełny tekst źródłaWang, Gui Chao, Ai Li Zhang i Yong Zhen Li. "Secure Authentication Protocol of RFID System Based on Access Control". Advanced Engineering Forum 6-7 (wrzesień 2012): 1072–77. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1072.
Pełny tekst źródła