Crowdsensing requires scalable privacy-preserving authentication that allows users to send anonymously sensing reports, while enabling eventual anonymity revocation in case of user misbehavior. Previous research efforts already provide efficient mechanisms that enable conditional privacy through pseudonym systems, either based on Public Key Infrastructure (PKI) or Group Signature (GS) schemes. However, previous schemes do not enable users to self-generate an unlimited number of pseudonyms per user to enable users to participate in diverse sensing tasks simultaneously, while preventing the users from participating in the same task under different pseudonyms, which is referred to as sybil attack. This paper addresses this issue by providing a...
In this paper, we give a location privacy-preserving solution for the mobile crowd sensing (MCS) sys...
With the widespread growth of cloud computing and mobile healthcare crowd sensing (MHCS), an increas...
In the last decades, several signcryption schemes have been proposed for different privacy-enhancing...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
With the pervasiveness and increasing capability of smart devices, mobile crowdsensing has been appl...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with t...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
International audienceMobile crowdsensing allows gathering massive data across time and space to fee...
Group signatures allow users to create signatures on behalf of a group while remaining anonymous. Su...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
In this paper, we outline an approach to the identification of entities for access control that is b...
Currently, people have a limited range of choices in managing their identity online. They can use th...
In this paper, we give a location privacy-preserving solution for the mobile crowd sensing (MCS) sys...
In this paper, we give a location privacy-preserving solution for the mobile crowd sensing (MCS) sys...
With the widespread growth of cloud computing and mobile healthcare crowd sensing (MHCS), an increas...
In the last decades, several signcryption schemes have been proposed for different privacy-enhancing...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
With the pervasiveness and increasing capability of smart devices, mobile crowdsensing has been appl...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with t...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
International audienceMobile crowdsensing allows gathering massive data across time and space to fee...
Group signatures allow users to create signatures on behalf of a group while remaining anonymous. Su...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
In this paper, we outline an approach to the identification of entities for access control that is b...
Currently, people have a limited range of choices in managing their identity online. They can use th...
In this paper, we give a location privacy-preserving solution for the mobile crowd sensing (MCS) sys...
In this paper, we give a location privacy-preserving solution for the mobile crowd sensing (MCS) sys...
With the widespread growth of cloud computing and mobile healthcare crowd sensing (MHCS), an increas...
In the last decades, several signcryption schemes have been proposed for different privacy-enhancing...