2015
DOI: 10.1007/s11277-015-2699-1
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme

Abstract: Past few years, the mobile technology and location based services have experienced a great increment in number of its users. The privacy issues related to these services are becoming main concerns because of the leakage of users' private information and contents. To prevent revelation of private information, many researchers have proposed several secure and authentication schemes which apply various technologies to provide integral security properties, such as symmetric encryption, digital signature, timestamp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0
2

Year Published

2017
2017
2018
2018

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 110 publications
(49 citation statements)
references
References 29 publications
0
47
0
2
Order By: Relevance
“…The second strategy is about the identity issue; in addition to the encryption techniques mentioned before, other solutions exploit node locations [11][12][13][14], which help in determining the malicious nodes on the basis of their positions with respect to the normal ones. As an example, Verifiable Multilateration (VM) [12] uses localization in order to evaluate the reliability of the sensor nodes and identifying possible outliers.…”
Section: 1mentioning
confidence: 99%
See 1 more Smart Citation
“…The second strategy is about the identity issue; in addition to the encryption techniques mentioned before, other solutions exploit node locations [11][12][13][14], which help in determining the malicious nodes on the basis of their positions with respect to the normal ones. As an example, Verifiable Multilateration (VM) [12] uses localization in order to evaluate the reliability of the sensor nodes and identifying possible outliers.…”
Section: 1mentioning
confidence: 99%
“…As an example, Verifiable Multilateration (VM) [12] uses localization in order to evaluate the reliability of the sensor nodes and identifying possible outliers. Note that [13,14] are tailored to secure wireless communications of mobile devices, but the defined methods could be applied to WSN.…”
Section: 1mentioning
confidence: 99%
“…3. After range compression, eq.3 can be given by (5) As shown in fig. 2, It appears that which is corresponds to turntable target is a matrix with almost parallel columns, so we expect it to be low rank.…”
Section: Multi-targets Imaging Based On Rpcamentioning
confidence: 99%
“…A cyber-physical system (CPS) model for the distribution power system is necessary to reflect interactions between the information flow and power flow [3]. CPS modelling has gained much more attention in the fields of computer science, control theory, and communication engineering [4,5].…”
Section: Introductionmentioning
confidence: 99%