With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...
There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the re...
Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jas...
Local search has become a hot topic recently in information retrieval research area. How to retrieve geographical information correctly and efficiently is a key challenge to locat...
Zhisheng Li, Chong Wang 0002, Xing Xie, Xufa Wang,...