Defending Location Privacy Using Zero Knowledge Proof Concept in Location Based Services
Citations
83 citations
66 citations
Cites background from "Defending Location Privacy Using Ze..."
...This is demonstrated, in the context of preservation of user privacy in location-based services, in [10]....
[...]
20 citations
20 citations
Cites background from "Defending Location Privacy Using Ze..."
...The second scheme, the Zero knowledge authentication scheme, is suitable for the handover procedure where there are two evolving entities, eNBs, that need to verify each other as a prover and verifier [6]....
[...]
18 citations
References
233 citations
"Defending Location Privacy Using Ze..." refers background in this paper
...Although there are PIR approaches for strict privacy but their complexity and high pre processing requirement make them incongruous for use....
[...]
...It also doesn’t consider the ticket clearance scenarios where the credential Center is not available due to any unforeseen reason [4]....
[...]
...The ticket based service access scheme for the mobile users proposed by Hua Wang, Jinli Cao and yanchuan Zhang discusses about the mobile databases accessed across multiple service domains anonymously [4]....
[...]
68 citations
"Defending Location Privacy Using Ze..." refers background in this paper
...This act has the support of a broad coalition of consumer protection and anti-stalking advocacy groups....
[...]
50 citations
44 citations
20 citations
"Defending Location Privacy Using Ze..." refers background in this paper
...Researchers have come up with an excellent taxonomy of the many available location privacy preserving systems....
[...]