Search Results

There are 202256 results for: content related to: A mobile phone-based physical-social location proof system for mobile social network service

  1. Location-preserved contention-based routing in vehicular ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 9, June 2016, Pages: 886–898, Qing Yang, Alvin Lim, Xiaojun Ruan, Xiao Qin and Dongjin Kim

    Version of Record online : 11 APR 2014, DOI: 10.1002/sec.1008

  2. For your phone only: custom protocols for efficient secure function evaluation on mobile devices

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1165–1176, Henry Carter, Chaitrali Amrutkar, Italo Dacosta and Patrick Traynor

    Version of Record online : 23 JUL 2013, DOI: 10.1002/sec.851

  3. Privacy-preserving framework for geosocial applications

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1764–1779, Lukas Malina and Jan Hajny

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.873

  4. Filtering location optimization for the reactive packet filtering

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1150–1164, Ning Lu, Yulong Wang, Sen Su, Fangchun Yang and Rui Han

    Version of Record online : 19 JUL 2013, DOI: 10.1002/sec.848

  5. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Version of Record online : 27 JAN 2012, DOI: 10.1002/sec.411

  6. Thwarting location privacy protection in location-based social discovery services

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1496–1508, Minhui Xue, Yong Liu, Keith W. Ross and Haifeng Qian

    Version of Record online : 4 FEB 2016, DOI: 10.1002/sec.1438

  7. ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 401–419, Sanaa Taha and Xuemin (Sherman) Shen

    Version of Record online : 9 OCT 2012, DOI: 10.1002/sec.625

  8. Enhancing information lookup privacy through homomorphic encryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2804–2814, N. Fotiou, D. Trossen, G.F. Marias, A. Kostopoulos and G.C. Polyzos

    Version of Record online : 15 NOV 2013, DOI: 10.1002/sec.910

  9. Intrusion-aware trust model for vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1652–1669, Riaz Ahmed Shaikh and Ahmed Saeed Alzahrani

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.862

  10. X-Region: A framework for location privacy preservation in mobile peer-to-peer networks

    International Journal of Communication Systems

    Volume 28, Issue 1, 10 January 2015, Pages: 167–186, Yanzhe Che, Qinming He, Xiaoyan Hong and Kevin Chiew

    Version of Record online : 18 SEP 2013, DOI: 10.1002/dac.2650

  11. Toward attack-resistant localization under infrastructure attacks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 384–403, Jie Yang and Yingying Chen

    Version of Record online : 12 MAY 2011, DOI: 10.1002/sec.323

  12. LTPPM: a location and trajectory privacy protection mechanism in participatory sensing

    Wireless Communications and Mobile Computing

    Volume 15, Issue 1, January 2015, Pages: 155–169, Sheng Gao, Jianfeng Ma, Weisong Shi and Guoxing Zhan

    Version of Record online : 6 DEC 2012, DOI: 10.1002/wcm.2324

  13. You have free access to this content
    Monday, December 4, 2006 Poster Session IV 7:30 a.m. – 4:30 p.m.

    Epilepsia

    Volume 47, Issue s4, October 2006, Pages: 289–373,

    Version of Record online : 30 OCT 2006, DOI: 10.1111/j.1528-1167.2006.00001_8.x

  14. You have full text access to this OnlineOpen article
    Research analysis of wireless localization with insufficient resources for next-generation mobile communication networks

    International Journal of Communication Systems

    Volume 26, Issue 9, September 2013, Pages: 1206–1226, Qimei Cui and Xuefei Zhang

    Version of Record online : 17 MAY 2012, DOI: 10.1002/dac.2370

  15. Mobile cloud computing based privacy protection in location-based information survey applications

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1006–1025, Hao Zhang, Nenghai Yu and Yonggang Wen

    Version of Record online : 18 JUL 2014, DOI: 10.1002/sec.1055

  16. A privacy-preserving location tracking system for smartphones based on cloud storage

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 446–458, Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai and Yang Xiang

    Version of Record online : 28 MAR 2014, DOI: 10.1002/sec.992

  17. Enforcing mobile security with location-aware role-based access control

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 429–439, Nils Ulltveit-Moe and Vladimir Oleshchuk

    Version of Record online : 13 NOV 2013, DOI: 10.1002/sec.879

  18. Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1398–1404, Nan Run Zhou, Xiao Rong Liang, Zhi Hong Zhou and Ahmed Farouk

    Version of Record online : 14 JAN 2016, DOI: 10.1002/sec.1425

  19. STaR: design and quantitative measurement of source-location privacy for wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 220–228, Leron Lightfoot, Yun Li and Jian Ren

    Version of Record online : 29 MAR 2012, DOI: 10.1002/sec.527

  20. Linear versus non-linear earthquake location and seismogenic fault detection in the southern Tyrrhenian Sea, Italy

    Geophysical Journal International

    Volume 172, Issue 2, February 2008, Pages: 607–618, D. Presti, B. Orecchio, G. Falcone and G. Neri

    Version of Record online : 19 NOV 2007, DOI: 10.1111/j.1365-246X.2007.03642.x