2013
DOI: 10.1007/978-1-4471-5164-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Security in Emerging 4G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…(i) Location privacy: in crowdsourced LBS, locationidentity relationship is relatively easy to be exposed using correlation attacks [14].…”
Section: Privacy Requirements Of Crowdsourced Lbs Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…(i) Location privacy: in crowdsourced LBS, locationidentity relationship is relatively easy to be exposed using correlation attacks [14].…”
Section: Privacy Requirements Of Crowdsourced Lbs Applicationsmentioning
confidence: 99%
“…In this subsection, we survey the LPPMs that were proposed for legacy LBS [14] which are as follows: (ii) Private Information Retrieval (PIR): both request and reply are encrypted, leaving the server unable to identify the sender or the request. This mechanism is suitable for legacy LBS but impractical in crowdsourcing, since the search engines need to send the crowd a plaintext job.…”
Section: Location Privacy Preserving Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation