Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Jun 12, 2017 · A popular approach to protect location privacy is anonymizing the users of LBS systems. In this paper, we introduce an information-theoretic ...
Jan 20, 2017 · We show that wireless devices can achieve provable perfect location privacy by using the anonymization method in the suggested way. In [41] ...
This technique assigns a random pseudonym to each user and these pseudonyms can change over time. Here, we provide a general information theoretic definition ...
Abstract—The popularity of mobile devices and location-based services (LBS) has raised significant concerns regarding the location privacy of their users.
... Achieving Perfect Location Privacy in Wireless Devices Using Anonymization" (2017). ... privacy is achievable for mobile devices when using the anonymization ...
Anonymization is a common technique that is often used to protect the location privacy of LBS users. Here, we present an information-theoretic approach to ...
An information-theoretic notion for location privacy is introduced, which is calledperfect location privacy, and it is demonstrated how anonymization should ...
A popular approach to protect location privacy is anonymizing the users of LBS systems. In this paper, we introduce an information-theoretic notion for location ...
This work model a mobile user's path using Markov chains and shows that perfect location privacy is achievable for the user if her pseudonym is changed ...
Bibliographic details on Achieving Perfect Location Privacy in Wireless Devices Using Anonymization.