A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy
The privacy preservation has received considerable attention from organizations as the
growing population is apprehensive regarding personal data being preserved. Smart …
growing population is apprehensive regarding personal data being preserved. Smart …
Privacy-preservation techniques for IoT devices: a systematic mapping study
D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
BSDP: Blockchain-based smart parking for digital-twin empowered vehicular sensing networks with privacy protection
The popularity of vehicles brings parking issues, especially in the downtown area. To tackle
these issues, the concept of smart parking is presented, which utilizes industrial Internet of …
these issues, the concept of smart parking is presented, which utilizes industrial Internet of …
PRSD: Efficient protocol for privacy-preserving retrieval of sensitive data based on labeled PSI
The demand for privacy-preserving retrieval of sensitive data arises in various practical
scenarios, from national security to personal data privacy. The typical scenario involves two …
scenarios, from national security to personal data privacy. The typical scenario involves two …
[PDF][PDF] Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems.
In crowded cities, searching for the availability of parking lots is a herculean task as it results
in the wastage of drivers' time, increases air pollution, and traffic congestion. Smart parking …
in the wastage of drivers' time, increases air pollution, and traffic congestion. Smart parking …
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center
B Lian, J Cui, H Chen, X Zhao, F Wang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Many IoT applications require users to share their devices' location, and enhanced privacy-
protection means sharing location anonymously, unlinkably and without relying on any …
protection means sharing location anonymously, unlinkably and without relying on any …
[HTML][HTML] Privacy-Protection Method for Blockchain Transactions Based on Lightweight Homomorphic Encryption
G Wang, C Li, B Dai, S Zhang - Information, 2024 - mdpi.com
This study proposes an privacy-protection method for blockchain transactions based on
lightweight homomorphic encryption, aiming to ensure the security of transaction data and …
lightweight homomorphic encryption, aiming to ensure the security of transaction data and …
Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval
Blockchain networks provide a reliable and secure mode of communication due to their
decentralized and distributed nature. The emergence of amalgamated blockchain-based …
decentralized and distributed nature. The emergence of amalgamated blockchain-based …
Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function
In recent years, service provided based on the location has brought a tremendous change in
our lives. However, one of the biggest challenges is to preserve users' privacy which upon …
our lives. However, one of the biggest challenges is to preserve users' privacy which upon …
[PDF][PDF] 基于联盟链的身份环签密方案
俞惠芳, 吕芝蕊 - 电子与信息学报, 2023 - jeit.ac.cn
针对联盟链交易时存在的用户隐私泄露问题, 该文提出基于联盟链的身份环签密(CB-IDRSC)
方案. CB-IDRSC 利用智能合约技术控制新交易加入, 实现了公平可靠性; 利用多个私钥生成器 …
方案. CB-IDRSC 利用智能合约技术控制新交易加入, 实现了公平可靠性; 利用多个私钥生成器 …