Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2913547
Abstract: With the popularity of location-based services in the field of mobile network applications, users enjoy the convenience on one side, they may face the risk of privacy disclosure on the other side. Attackers can easily…
read more here.
Keywords:
location privacy;
privacy protection;
location;
user location ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3180046
Abstract: Location privacy techniques try to protect user’s information by altering, aggregating or generalizing it. Geographical codification techniques, like Geohash, can be used to protect individual locations altering the precision of the location so it represents…
read more here.
Keywords:
location;
locality;
hall mirrors;
user location ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Emerging Topics in Computing"
DOI: 10.1109/tetc.2014.2335537
Abstract: The recent proliferation of GPS-enabled mobile phones has allowed people to share their current locations with others. Because disclosing one’s location can be valuable but risky, many services and studies employ a user’s GPS coordinates…
read more here.
Keywords:
location;
well user;
privacy preferences;
privacy ... See more keywords