ARCHIVES
Research Article
Study of Data Security in Position Centered Services
P Raja1
M Ravikumar2
12Asst.Professor Department of CSE Lakshmi Narayan College of Technology, MP, India.
Published Online: September-December 2023
Pages: 23-26
Cite this article
No DOIReferences
1. JaydipSen, “A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks” International Journal of
Communication Networks and Information Security (IJCNIS) Vol. 4, No. 1, April2012.
2. Karl-Peter Fuchs, Hannes Federrath,, Christopher Piosecny, Dominik Herrmann, “Privacy-Preserving DNS: Analysis of Broadcast,
RangeQueries andMix-basedProtectionMethods”Volume6879oftheseriesLectureNotesinComputerSciencepp665-683.
3. GianlucaDiniandPericlePerazzo,“Auniformity-basedapproachtolocationprivacy”0140-36642015PublishedbyElsevierB.V.
4. Jonathan Cazalas and Muhammad Aqib, “Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services”
Computer and Information Science; Vol. 8, No. 4; 2015 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science
and Education
5. Xiaodong Lin, RongxingLu and Jun Shao, “FINE: A Fine-Grained Privacy-Preserving Location-based Service Framework for Mobile
Devices” IEEE INFOCOM 2014 - IEEE Conference on ComputerCommunications.
6. Tadayoshi Kohno, Arvind Krishnamurthy, Gabriel Maganis and Thomas Ristenpart, “Privacy-Preserving Location Tracking of Lost or
Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs” Proceeding SS'08 Proceedings of the 17th
conference on Security symposium Pages 275-290 USENIX Association Berkeley, CA, USA©2008.
7. EranToch, Jason Hong, JanneLindqvist, Jialiu Lin and ShahriyarAmini, “Caché: Caching Location-Enhanced Content to Improve User
Privacy” Proceeding MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services Pages
197-210 ACM New York, NY, USA©2011.
8. Ian Goldberg and Femi Olumofin, “Preserving Access Privacy Over Large Databases” ACM New York, NY, USA©2011.
9. Dirk Grunwald and Marco Gruteser, “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking”
Proceeding MobiSys '03 Proceedings of the 1st international conference on Mobile systems, applications and services Pages 31-42 ACM
New York, NY, USA©2003
Communication Networks and Information Security (IJCNIS) Vol. 4, No. 1, April2012.
2. Karl-Peter Fuchs, Hannes Federrath,, Christopher Piosecny, Dominik Herrmann, “Privacy-Preserving DNS: Analysis of Broadcast,
RangeQueries andMix-basedProtectionMethods”Volume6879oftheseriesLectureNotesinComputerSciencepp665-683.
3. GianlucaDiniandPericlePerazzo,“Auniformity-basedapproachtolocationprivacy”0140-36642015PublishedbyElsevierB.V.
4. Jonathan Cazalas and Muhammad Aqib, “Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services”
Computer and Information Science; Vol. 8, No. 4; 2015 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science
and Education
5. Xiaodong Lin, RongxingLu and Jun Shao, “FINE: A Fine-Grained Privacy-Preserving Location-based Service Framework for Mobile
Devices” IEEE INFOCOM 2014 - IEEE Conference on ComputerCommunications.
6. Tadayoshi Kohno, Arvind Krishnamurthy, Gabriel Maganis and Thomas Ristenpart, “Privacy-Preserving Location Tracking of Lost or
Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs” Proceeding SS'08 Proceedings of the 17th
conference on Security symposium Pages 275-290 USENIX Association Berkeley, CA, USA©2008.
7. EranToch, Jason Hong, JanneLindqvist, Jialiu Lin and ShahriyarAmini, “Caché: Caching Location-Enhanced Content to Improve User
Privacy” Proceeding MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services Pages
197-210 ACM New York, NY, USA©2011.
8. Ian Goldberg and Femi Olumofin, “Preserving Access Privacy Over Large Databases” ACM New York, NY, USA©2011.
9. Dirk Grunwald and Marco Gruteser, “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking”
Proceeding MobiSys '03 Proceedings of the 1st international conference on Mobile systems, applications and services Pages 31-42 ACM
New York, NY, USA©2003
Related Articles
2023
Model Aphid Predator Neuroptera (Insecta): Web-Based Digital Key Development from Dichotomous Key by Computer Programming
2023
Distributed computing and Large Information Investigation
2023
Relative Investigation: Wi-Fi Security Conventions
2023
Near Investigation of Characterization Calculations for Web Spam Recognition
2023
Heart Disease Prediction with Novel Machine Learning Technique
2023