An efficient privacy-preserving localization algorithm for pervasive computing

被引:0
|
作者
Wang, Guanghui [1 ,2 ]
Pan, Jianping [2 ]
He, Jianping [3 ]
Shen, Subin [1 ]
机构
[1] College of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China
[2] Department of Computer Science, University of Victoria, BC, Canada
[3] Department of Automation, Shanghai Jiao Tong University, Shanghai, China
关键词
461.4 Ergonomics and Human Factors Engineering - 716 Telecommunication; Radar; Radio and Television - 718 Telephone Systems and Related Technologies; Line Communications - 723.2 Data Processing and Image Processing - 723.5 Computer Applications - 913.1 Production Engineering;
D O I
暂无
中图分类号
学科分类号
摘要
22
引用
收藏
相关论文
共 50 条
  • [1] An Efficient Privacy-Preserving Localization Algorithm for Pervasive Computing
    Wang, Guanghui
    Pan, Jianping
    He, Jianping
    Shen, Subin
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [2] Analyzing and Evaluating Efficient Privacy-Preserving Localization for Pervasive Computing
    Wang, Guanghui
    He, Jianping
    Shi, Xiufang
    Pan, Jianping
    Shen, Subin
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2993 - 3007
  • [3] Multi-lateral Privacy-Preserving Localization in Pervasive Environments
    Shu, Tao
    Chen, Yingying
    Yang, Jie
    Williams, Albert
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2319 - 2327
  • [4] A capability-based privacy-preserving scheme for pervasive computing environments
    Konidala, DM
    Duc, DN
    Lee, D
    Kim, K
    THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, WORKSHOPS, 2005, : 136 - 140
  • [5] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [6] Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 23 - 42
  • [7] Efficient Privacy-Preserving Biometric Identification in Cloud Computing
    Yuan, Jiawei
    Yu, Shucheng
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2652 - 2660
  • [8] Privacy-preserving cooperative localization in vehicular edge computing infrastructure
    Shit, Rathin Chandra
    Sharma, Suraj
    Watters, Paul
    Yelamarthi, Kumar
    Pradhan, Biswajeet
    Davison, Richard
    Morgans, Graham
    Puthal, Deepak
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (14):
  • [9] Privacy preserving protocol for pervasive computing
    Guo, Yajun
    He, Yanxiang
    Qi, Mei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (11): : 103 - 105
  • [10] Advances in privacy-preserving computing
    Kaiping Xue
    Zhe Liu
    Haojin Zhu
    Miao Pan
    David S. L. Wei
    Peer-to-Peer Networking and Applications, 2021, 14 : 1348 - 1352