2022
DOI: 10.1155/2022/2328734
|View full text |Cite
|
Sign up to set email alerts
|

User Sensitive Information Protection Scheme Based on Blockchain Technology

Abstract: With the continuous development of mobile applications and location technology, k -anonymity technology is usually used to protect the privacy and security of users in location-based services that are used by mobile users. Due to the self-interest of users, in the cooperative construction of a k -anonymity privacy protection scheme, it is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…As an alternative to the password system or its addition, user identification based on biometric characteristics and signs can be considered. Biometric technologies of identification and authentication have a number of advantages over traditional ones and are increasingly used in computer systems and various spheres of information activity [2]. Biometric verification of your biological data, and not just verification of a password that can be stolen, intercepted or guessed, is the key to the expansion of e-commerce, the creation of new information security systems in corporate networks and other modern systems.…”
Section: Methods Of Intellectual Analysis and Comparison Of Fingerprintsmentioning
confidence: 99%
“…As an alternative to the password system or its addition, user identification based on biometric characteristics and signs can be considered. Biometric technologies of identification and authentication have a number of advantages over traditional ones and are increasingly used in computer systems and various spheres of information activity [2]. Biometric verification of your biological data, and not just verification of a password that can be stolen, intercepted or guessed, is the key to the expansion of e-commerce, the creation of new information security systems in corporate networks and other modern systems.…”
Section: Methods Of Intellectual Analysis and Comparison Of Fingerprintsmentioning
confidence: 99%
“…In recent years, blockchain technology [20][21][22][23] has developed rapidly. Due to its characteristics of decentralization, anonymity, and trust, a large number of researchers have done more and more research work on the combination of blockchain and Internet of vehicles from different angles.…”
Section: Lack Of Efficient Resource Scheduling Mechanismmentioning
confidence: 99%
“…Figure 1 is the model diagram of the mobile vehicle computing task offloading system based on the alliance blockchain [20][21][22][23] designed in this paper. e model mainly includes three classes of entities: trusted Authority (TA), roadside unit (RSU), and mobile vehicles.…”
Section: System Entitiesmentioning
confidence: 99%
“…Nowadays, indoor localization [1,2] has been widely used in many applications, like searching and rescuing people alive in the earthquake [3], detection for mining safety, battlefeld military applications, patient monitoring, and intrusion detection [4,5], and so on [6][7][8]. A wearable sensor based localization technique has been proposed and has shown decent performance for indoor localization.…”
Section: Introductionmentioning
confidence: 99%