A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis
2022
Applied Sciences
Secondly, the compatibility of privacy laws with security technologies focusing on the gap between the legal definitions and the technological implementation of privacy-preserving techniques are discussed ...
The interdisciplinary approach will ensure that the overlapping stakeholder roles and the blurring implementation of data privacy-preserving techniques within the ACSs landscape are efficiently addressed ...
Acknowledgments: The photo in Figure 1 was provided by the Geneva Public Transport, Switzerland.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app12094413
fatcat:zveop6hjdrc4hkht77didszh2e
Lightweight Cryptographic Techniques for Automotive Cybersecurity
2018
Wireless Communications and Mobile Computing
This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms. ...
Vehicular networks are unique in terms of characteristics, challenges, architecture, and applications. ...
Li et al. proposed a malware detection system based on permission usage analysis by significant permission identification technique. 3 levels of pruning by mining the permission data are developed to identify ...
doi:10.1155/2018/1640167
fatcat:nitjuwgn2jffjjdcif5fez7t4u
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
2017
IEEE Communications Surveys and Tutorials
In this paper, we review the state of the art of privacy-preserving schemes for ad hoc social networks, including, mobile social networks (MSNs) and vehicular social networks (VSNs). ...
With this survey, readers can have a more thorough understanding of research trends in privacy-preserving schemes for ad hoc social networks. ...
In addition, PACP is efficient in terms of protocol latency analysis and comparison of search times for revocation. ...
doi:10.1109/comst.2017.2718178
fatcat:pmlbjv3dnvfclfoqg2pnxlc7mi
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks
2018
IEEE Access
In this paper, a fog-based privacy-preserving scheme is proposed to enhance the security of the vehicular crowdsensing network. ...
In this paper, a fog-based privacy-preserving scheme is proposed to enhance the security of the vehicular crowdsensing network. ...
ACKNOWLEDGMENT The authors wish to thank the reviewers for their helpful comments. ...
doi:10.1109/access.2018.2861430
fatcat:jdyurlqwrvhnzjts4qqqgdktju
Blockchain-Enabled Vehicular Ad Hoc Networks: A Systematic Literature Review
2022
Sustainability
The techniques, limitations, and advantages of blockchain deployment in VANETs are discussed for the effective implementation of a decentralized network. ...
Therefore, this study also emphasizes the identification of any blockchain-related open issues for future prospects. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/su14073919
fatcat:tvcdbygjkjea3a3u55amrftkha
Table of Contents
2018
2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)
264
Privacy Preserving Data Aggregation On Secure Cloud
265
A Skill Based Image Grid Authentication Scheme
266
Pob Number System Based Multi-Image Secret Sharing
267
Ram Forensics: The Analysis ...
Data Technologies : A Survey
219
Survey On Frequent Item-Set Mining Approaches In Market Basket Analysis
220
Privacy-Preserving Outsourced Mining Of D-Eclat Association Rules On Vertically Partitioned ...
doi:10.1109/iccubea.2018.8697655
fatcat:jvjgmcrh3fhxtkf4kyydawnkiq
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
2008
Computer Communications
Privacy and security should be paid much more attention in secure vehicular ad hoc networks (VANETs). ...
techniques into the scheme in allowing mobile vehicles to anonymously interact with the services of roadside infrastructure. ...
) but also provides the advantage of user privacy preservation. ...
doi:10.1016/j.comcom.2007.12.005
fatcat:pujum4l6rjd2bjjevhan4snrqe
Blockchain-Based Secure Data Storage for Distributed Vehicular Networks
2020
Applied Sciences
In this paper, a blockchain-based secure data sharing mechanism is proposed for Vehicular Networks (VNs). ...
It is used to tackle the issues related to data storage in centralized architectures, such as data tampering, lack of privacy, vulnerability to hackers, etc. ...
sharing scenario
Efficient access control and
permission levels
Data chain and behaviour chain is
used for data sharing
Security and privacy preserving
data sharing systems
Proposed system is ...
doi:10.3390/app10062011
fatcat:flgkbzadvrbn5nig52vajk6c3i
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
[article]
2017
arXiv
pre-print
In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables. ...
The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. ...
VII. summarizes the informal and formal security analysis techniques used in authentication and privacy preserving schemes for 4G and 5G Cellular Networks. ...
arXiv:1708.04027v1
fatcat:lozrjocwq5eblkams72kk4rv6i
A Privacy-Preservation Framework based on Biometrics Blockchain (BBC) to Prevent Attacks in VANET
2021
IEEE Access
In another work authors have proposed a technique in vehicleto-grid (V2G) networks to enable data sharing without compromising user data safety using blockchain. ...
On the one hand, communication in VANET shall provide privacy preservation by employing anonymity of vehicles. ...
doi:10.1109/access.2021.3086225
fatcat:fs3sdya6kfaebj5lo3vmn542xe
Modeling Adversarial Behavior Against Mobility Data Privacy
2020
IEEE transactions on intelligent transportation systems (Print)
Privacy risk assessment is a crucial issue in any privacy-aware analysis process. ...
In this work, we propose Simulated Privacy Annealing (SPA), a new adversarial behavior model for privacy risk assessment in mobility data. ...
Many privacy-preserving techniques for human mobility data have been proposed in literature [12] . ...
doi:10.1109/tits.2020.3021911
fatcat:i7krbpufcnhudcunzukwz5yph4
Recommender system for privacy-preserving solutions in smart metering
2017
Pervasive and Mobile Computing
However, Smart Meters introduce many privacy issues if consumption data is analysed. In this paper we analyse the main techniques that address privacy when collecting electricity readings. ...
In addition to privacy, it is equally important to preserve efficiency to carry on with monitoring operations, so further control requirements and communication protocols are also studied. ...
In addition, this work has been partially supported by the Spanish Ministry of Economy and Competitiveness through the PERSIST (TIN2013-41739-R) and SMOG (TIN2016-79095-C2-1-R) projects. ...
doi:10.1016/j.pmcj.2017.03.008
fatcat:77lfptdl2ffapcwjum4i6m4hou
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats Countermeasures
[article]
2020
arXiv
pre-print
Security and privacy of the users have become significant concerns due to the involvement of the Internet of things (IoT) devices in numerous applications. ...
However, these studies target either security or privacy issues using ML algorithms or BC techniques, thus posing a need for a combined survey on efforts made in recent years addressing both security and ...
In the future, we aim to design and develop a privacy-preserving IoT framework, which will offer privacy-preserving data sharing and privacy-preserving data analysis. ...
arXiv:2002.03488v4
fatcat:cxavellepncexgkfcs5phdj53u
DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY
2021
IEEE Access
Adversaries carry out privacy-oriented attacks to gain access to the sensitive and confidential data of critical infrastructure for various self-centered, political and commercial gains. ...
Therefore, Dwork's differential privacy has emerged as the most viable privacy preservation strategy for IoT-enabled critical infrastructure. ...
loss enables the control on the amount of information leakage allowed whilst preserving data utility and comparison of the different techniques of privacy preservation [23] , [24] , [83] . ...
doi:10.1109/access.2021.3124309
fatcat:vejtyjyrwffeffi7ob2o2svyja
In Depth Analysis of Attacks & Countermeasures in Vehicular Ad Hoc Network
2016
International Journal of Software Engineering and Its Applications
A vehicular ad hoc network (VANETs) is very important factor for improving the road safety and comforting of the travelers. ...
It's associate spontaneous network for the longer term Intelligent Transport System (ITS) sensible progress achieved by the investigator on study of Vehicular Ad hoc Network. ...
Anoop Singh has given me additional support for my research design, data collection, analysis and interpretation. ...
doi:10.14257/ijseia.2016.10.12.29
fatcat:xxmgwvakyzbs5hctuyunwslguq
« Previous
Showing results 1 — 15 out of 946 results