2021
DOI: 10.1109/access.2021.3087478
|View full text |Cite
|
Sign up to set email alerts
|

Computation of Infection Risk via Confidential Locational Entries: A Precedent Approach for Contact Tracing With Privacy Protection

Abstract: To effectively mitigate the COVID-19 pandemic, various methods have been proposed to control the infection risk using mobile phone technologies. In this respect, short-range Bluetooth in mobile phones has been mostly used to detect contacts with other devices that approach within a certain range for a specific duration and to notify residents regarding potential contact with infected patients. However, the technology can only detect direct contacts and neglects various modalities of infection, which might have… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…The second case is the so-called CIRCLE method. In many Asian countries such as Japan, South Korea, or Taiwan, differing approaches for DCTAs have been discussed and tested as early as 2010 [ 39 ]. The CIRCLE method is one of the young offspring of this family of approaches.…”
Section: Resultsmentioning
confidence: 99%
“…The second case is the so-called CIRCLE method. In many Asian countries such as Japan, South Korea, or Taiwan, differing approaches for DCTAs have been discussed and tested as early as 2010 [ 39 ]. The CIRCLE method is one of the young offspring of this family of approaches.…”
Section: Resultsmentioning
confidence: 99%
“…The study used RDF to express location information of cases released by local governments to alert residents in the regions. PLOD can provide personalized exposure notification to cell-phone users, by combining mobility information of their devices stored by cell phone carriers without violating the privacy of patients and residents [ 20 ].…”
Section: Related Workmentioning
confidence: 99%
“…Contact Tracing. There are two mainstream contact tracing technologies, namely proximity-based solutions [3], [4], [5], [6], [7], [8], [9], [25], [26], [27], [28], [29] and location-based solutions [10], [11], [12], [13], [14], [15], [16], [17], [21].…”
Section: Related Workmentioning
confidence: 99%
“…Location-based contact tracing methods identify close contact pairs using historical location data instead of wireless proximity information. Different from our work on efficient contact tracing over historical data, many works focus on developing the contact tracer as an administrative web-based system [11], a privacy-enhanced mobile application [10], [12], [15], or a decentralized Blockchain-based system [16]. Several works [13], [14], [17] consider the efficiency of close contact search.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation