Search Results

There are 134583 results for: content related to: Privacy-protected communication for location-based services

  1. DALP: A demand-aware location privacy protection scheme in continuous location-based services

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 4, 25 March 2016, Pages: 1219–1236, Xinghua Li, Ermeng Wang, Weidong Yang and Jianfeng Ma

    Version of Record online : 6 NOV 2015, DOI: 10.1002/cpe.3613

  2. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  3. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  4. Semantic analysis in location privacy preserving

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 6, 25 April 2016, Pages: 1884–1899, Ping Xiong, Lefeng Zhang and Tianqing Zhu

    Version of Record online : 29 APR 2015, DOI: 10.1002/cpe.3508

  5. Improved multi-server authentication protocol

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 331–341, Chun-Hui Huang, Jue-Sam Chou, Yalin Chen and Siang Yu Wun

    Version of Record online : 12 MAY 2011, DOI: 10.1002/sec.332

  6. Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3205–3218, Xiang Cheng, Sen Su, Yiping Teng and Ke Xiao

    Version of Record online : 30 MAR 2015, DOI: 10.1002/sec.1245

  7. Adaptive-capacity and robust natural language watermarking for agglutinative languages

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 301–310, Mi-Young Kim and Randy Goebel

    Version of Record online : 12 MAY 2011, DOI: 10.1002/sec.336

  8. Multiple objective optimization of the fleet sizing problem for road freight transportation

    Journal of Advanced Transportation

    Volume 45, Issue 4, October 2011, Pages: 321–347, Jacek Żak, Adam Redmer and Piotr Sawicki

    Version of Record online : 2 FEB 2011, DOI: 10.1002/atr.111

  9. Optimizing resource and data security in shared sensor networks

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 149–165, Christophe Huygens, Nelson Matthys and Wouter Joosen

    Version of Record online : 14 JUN 2011, DOI: 10.1002/sec.342

  10. People-centric sensing in assistive healthcare: Privacy challenges and directions

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1295–1307, Thanassis Giannetsos, Tassos Dimitriou and Neeli R. Prasad

    Version of Record online : 25 FEB 2011, DOI: 10.1002/sec.313

  11. Privacy-preserving frequent itemsets mining via secure collaborative framework

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 263–272, Kok Seng Wong and Myung Ho Kim

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.335

  12. Hilbert-order based spatial cloaking algorithm in road network

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 1, January 2013, Pages: 143–158, Yong-Ki Kim, Amina Hossain, Al-Amin Hossain and Jae-Woo Chang

    Version of Record online : 7 MAY 2012, DOI: 10.1002/cpe.2844

  13. Endogenous Technology Adoption and Medical Costs

    Health Economics

    Volume 25, Issue 9, September 2016, Pages: 1123–1147, Karine Lamiraud and Stephane Lhuillery

    Version of Record online : 4 AUG 2016, DOI: 10.1002/hec.3361

  14. X-Region: A framework for location privacy preservation in mobile peer-to-peer networks

    International Journal of Communication Systems

    Volume 28, Issue 1, 10 January 2015, Pages: 167–186, Yanzhe Che, Qinming He, Xiaoyan Hong and Kevin Chiew

    Version of Record online : 18 SEP 2013, DOI: 10.1002/dac.2650

  15. Toward attack-resistant localization under infrastructure attacks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 384–403, Jie Yang and Yingying Chen

    Version of Record online : 12 MAY 2011, DOI: 10.1002/sec.323

  16. Segmentation-based skinning

    Computer Animation and Virtual Worlds

    Jorge Eduardo Ramírez Flores and Antonio Susín Sánchez

    Version of Record online : 21 DEC 2015, DOI: 10.1002/cav.1687

  17. Location Based Commercial Services

    Standard Article

    The International Encyclopedia of Digital Communication and Society

    Katarina Stanoevska-Slabeva

    Published Online : 11 FEB 2015, DOI: 10.1002/9781118767771.wbiedcs159

  18. Fuzzy Boundaries: Hybridizing Location-based Services, Volunteered Geographic Information and Geovisualization Literature

    Geography Compass

    Volume 8, Issue 7, July 2014, Pages: 490–504, Britta Ricker, Sylvie Daniel and Nick Hedley

    Version of Record online : 10 JUL 2014, DOI: 10.1111/gec3.12138

  19. Architecture and Neogene to Recent evolution of the western Calabrian continental margin: An upper plate perspective to the Ionian subduction system, central Mediterranean

    Tectonics

    Volume 29, Issue 3, June 2010, Fabrizio Pepe, Attilio Sulli, Giovanni Bertotti and Federico Cella

    Version of Record online : 29 MAY 2010, DOI: 10.1029/2009TC002599

  20. Protecting location privacy and query privacy: a combined clustering approach

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 12, 25 August 2015, Pages: 3021–3043, Chi Lin, Guowei Wu and Chang Wu Yu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/cpe.3244