References
- C.-Y. Chow and M.F. Mokbel, "Privacy in Location-Based Services: A System Architecture Perspective," SIGSPATIAL, Special Issue, vol. 1, no. 2, 2009, pp. 23-27. https://doi.org/10.1145/1567253.1567258
- T.H.N. Vu, J.W. Lee, and K.H. Ryu, "Spatiotemporal Pattern Mining Technique for Location-Based Service System," ETRI J., vol. 30, no. 3, June 2008, pp. 421-431. https://doi.org/10.4218/etrij.08.0107.0238
- C. O'Driscoll, "Privacy in Context: Privacy Issues in Ubiquitous Computing Applications," Proc. ICDM, 2008, pp. 827-837.
- M.F. Mokbel, "Privacy in Location-Based Services: State-of-the- Art and Research Directions," Proc. MDM, 2007, p. 228.
- J.L. Wang and M.C. Loui, "Privacy and Ethical Issues in Location-Based Tracking Systems," Proc. ISTAS, 2009.
- H. Truong and S. Dustdar, "A Survey on Context-Aware Web Service Systems," IJWIS J., vol. 5, 2009.
- A. Moon et al., "Context-Aware Active Services in Ubiquitous Computing Environments," ETRI J, vol. 29, no. 2, 2007, pp. 169- 178. https://doi.org/10.4218/etrij.07.0106.0075
- A.M. Bernardos, P. Tarrio, and J.R. Casar, "A Data Fusion Framework for Context-Aware Mobile Services," Proc. MFI, 2008.
- T.C. Wang, G. Jia, and J. Huang, "Toward Context-Aware Location Based Services," Proc. ICEIE, 2010.
- S. Martin et al., "A Context-Aware Application Based on Ubiquitous Location," Proc. UBICOMM, 2008, pp. 83-88.
- M. Nonjur, S.I. Ahamed, and C.S. Hasan, "ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems," Proc. COMPSAC, 2009.
- D. Sambandaraksa, "Privacy a Double-Edged Sword," Bangkok Post., Oct. 13, 2010. http://www.bangkokpost.com/tech/ techscoop/201103/privacy-a-double-edged-sword
- W. Zhang et al., "The Location Privacy Protection Research in Location-Based Service," Proc. GEOINFORMATICS, 2010, pp. 1-4.
- T. Hashem and L. Kulik, "Safeguarding Location Privacy in Wireless Ad-Hoc Networks," Proc. UbiComp, 2007, pp. 372- 390.
- S. Wang and X.S. Wang, "In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud," Proc. MDM, 2010, pp. 381-386.
- Z. Gong, G.-Z. Sun, and X. Xie, "Protecting Privacy in Location- Based Services Using k-Anonymity without Cloaked Region," Proc. MDM, 2010, pp. 366-371.
- C. Bettini et al., "Anonymity in Location-Based Services: Towards a General Framework," Proc. MDM, 2007, pp. 69-76.
- Z.-J. Zhang, Z.-J. Wang, and B.-H. Zhang, "Studies on Median Value of Fuzzy Numbers Based on Confidence Level," Proc. ICMLC, 2008, pp. 588-593.
- H. Li, S.H. Dick, and W. Pedrycz, "Similarity Confidence Level for Fuzzy Rulebases," Proc. NAFIPS, 2004, pp. 882-887.
- B. Malek, A. Miri, and A. Karmouch, "A Framework for Context-Aware Authentication," Proc. IET, 2008.
- A.H.M. Ragab, N.A. Ismail, and O.S.F. Allah, "An Efficient Message Digest Algorithm (MD) for Data Security," Proc. TENCON, 2001, pp. 191-197.
- X.-H. Cheng and J.-Z. Deng, "Design of SHA-1 Algorithm Based on FPGA," Proc. NSWCTC, 2010, pp. 532-534.
- P. Kitsos and O. Koufopavlou, "Whirlpool Hash Function: Architecture and VLSI Implementation," Proc. ISCAS, 2004.
Cited by
- Dual-Phase Approach to Improve Prediction of Heart Disease in Mobile Environment vol.37, pp.2, 2013, https://doi.org/10.4218/etrij.15.2314.0103
- Pre-Association Messaging Framework for Mobile Proximity Service Based on Wi-Fi P2P vol.eb99, pp.2, 2013, https://doi.org/10.1587/transcom.2015ebp3242
- A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives vol.2017, pp.None, 2017, https://doi.org/10.1155/2017/2057260