In mobile and wireless environments, clients will request for information by submitting queries to the server, which delivers the required data via point-to-point connection or broadcast channels. The broadcast paradigm possesses the advantage of scalability. However, the broadcast data is vulnerable to eavesdropping and the adversary may be able to associate the requested data items and hence the original query with a specific client, a form of privacy threat that we would like to protect against. In this paper, we propose to protect the privacy of queries generated by individual clients by allowing them to hide themselves behind other clients. We assume a possibly untrustworthy server and make use of a trustworthy anonymizer for the queri...
Location-based Services (LBSs) provide valuable services, with convenient features for users. Howeve...
Internet and mobile communications have had a profound effect on today's society. New services are c...
Abstract—The proliferation of smartphones and handheld mo-bile devices spurs a variety of personaliz...
Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted an...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
With the proliferation of mobile handheld devices and widespread deployment of wireless technologies...
The mobile and wireless community has brought a significant growth of location-aware devices includi...
Internet and mobile communications have had a profound effect on today’s society. New services are c...
Even as wireless networks create the potential for access to information from mobile platforms, they...
In this thesis, we address privacy concerns in personalized mobile services. While there has been mu...
Even as wireless networks create the potential for access to information from mobile platforms, they...
Privacy preservation has recently received considerable at-tention for location-based mobile service...
Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users....
Targeted advertising is a complex mechanism to identify, track and profile users behaviour for their...
AbstractFor privacy protection, many architectures such as trusted third party, cryptography, client...
Location-based Services (LBSs) provide valuable services, with convenient features for users. Howeve...
Internet and mobile communications have had a profound effect on today's society. New services are c...
Abstract—The proliferation of smartphones and handheld mo-bile devices spurs a variety of personaliz...
Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted an...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
With the proliferation of mobile handheld devices and widespread deployment of wireless technologies...
The mobile and wireless community has brought a significant growth of location-aware devices includi...
Internet and mobile communications have had a profound effect on today’s society. New services are c...
Even as wireless networks create the potential for access to information from mobile platforms, they...
In this thesis, we address privacy concerns in personalized mobile services. While there has been mu...
Even as wireless networks create the potential for access to information from mobile platforms, they...
Privacy preservation has recently received considerable at-tention for location-based mobile service...
Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users....
Targeted advertising is a complex mechanism to identify, track and profile users behaviour for their...
AbstractFor privacy protection, many architectures such as trusted third party, cryptography, client...
Location-based Services (LBSs) provide valuable services, with convenient features for users. Howeve...
Internet and mobile communications have had a profound effect on today's society. New services are c...
Abstract—The proliferation of smartphones and handheld mo-bile devices spurs a variety of personaliz...