Articles with "trajectory privacy" as a keyword



Photo from wikipedia

Data Dissemination With Trajectory Privacy Protection for 6G-Oriented Vehicular Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3183406

Abstract: Data dissemination of vehicles is critical for vehicular networks because of the extensive impact of traffic information. The existing works for data dissemination in vehicular networks mainly use data scheduling algorithms to transmit data among… read more here.

Keywords: data dissemination; vehicular networks; privacy protection; trajectory privacy ... See more keywords
Photo from wikipedia

SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Green Communications and Networking"

DOI: 10.1109/tgcn.2021.3126618

Abstract: An automatic identification system (AIS) provides significant improvements in traffic monitoring, collision avoidance, and ship assistance. A unique Maritime Mobile Service Identity (MMSI) is used by the AIS transceiver to identify the specific ship. However,… read more here.

Keywords: anonymous authentication; authentication trajectory; traffic; trajectory privacy ... See more keywords