Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new application...
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
—When a universal personal telecommunications (UPT) user visits a mobile network, both terminal mobility and personal mobility are involved and it may take a long time for UPT ca...