Nowadays, mobile users have a vast number of applications and services at their disposal. Each of these might impose some privacy threats on users’ “Personally Identifiable Information” (PII). Location privacy is a crucial part of PII, and as such, privacy-aware users wish to maximize it. This privacy can be, for instance, threatened by a company, which collects users’ traces and shares them with third parties. To maximize their location privacy, users can decide to get offline so that the company cannot localize their devices. The longer a user stays connected to a network, the more services he might receive, but his location privacy decreases. In this paper, we analyze the trade-off between location privacy, the level of services that a u...
Location check-ins contain both geographical and semantic information about the visited venues. Sema...
The exchange of private information for services or other benefits is a commonplace practice today i...
Users of mobile networks can change their identifiers in regions called mix zones in order to defeat...
The mainstream approach to protecting the privacy of mobile users in location-based services (LBSs) ...
Abstract. Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic...
The mainstream approach to protecting the location-privacy of mobile users in location-based service...
In mobile networks, authentication is a required primitive for the majority of security protocols. H...
The Internet has fundamentally changed our society, the way we live, work and express ourselves. Imp...
Recent developments in information and communication technologies have been profound and life-changi...
Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequ...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
The widespread diffusion of mobile devices integrating location capabilities makes the location of u...
In recent years, the Internet of things has developed rapidly. And the location-based service (LBS) ...
International audienceInternet of Things (IoT) applications using sensors and actuators raise new pr...
Mobile social networks and location-aware applications are becoming more and more widespread in curr...
Location check-ins contain both geographical and semantic information about the visited venues. Sema...
The exchange of private information for services or other benefits is a commonplace practice today i...
Users of mobile networks can change their identifiers in regions called mix zones in order to defeat...
The mainstream approach to protecting the privacy of mobile users in location-based services (LBSs) ...
Abstract. Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic...
The mainstream approach to protecting the location-privacy of mobile users in location-based service...
In mobile networks, authentication is a required primitive for the majority of security protocols. H...
The Internet has fundamentally changed our society, the way we live, work and express ourselves. Imp...
Recent developments in information and communication technologies have been profound and life-changi...
Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequ...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
The widespread diffusion of mobile devices integrating location capabilities makes the location of u...
In recent years, the Internet of things has developed rapidly. And the location-based service (LBS) ...
International audienceInternet of Things (IoT) applications using sensors and actuators raise new pr...
Mobile social networks and location-aware applications are becoming more and more widespread in curr...
Location check-ins contain both geographical and semantic information about the visited venues. Sema...
The exchange of private information for services or other benefits is a commonplace practice today i...
Users of mobile networks can change their identifiers in regions called mix zones in order to defeat...