Location Privacy in Mobile Applications (häftad)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
101
Utgivningsdatum
2018-09-11
Upplaga
1st ed. 2018
Förlag
Springer Verlag, Singapore
Medarbetare
Zhou, Wanlei / Zhu, Tianqing
Illustratör/Fotograf
Bibliographie
Illustrationer
46 Illustrations, color; 1 Illustrations, black and white; XI, 101 p. 47 illus., 46 illus. in color.
Dimensioner
234 x 156 x 6 mm
Vikt
173 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9789811317040
Location Privacy in Mobile Applications (häftad)

Location Privacy in Mobile Applications

Häftad Engelska, 2018-09-11
709
Skickas inom 10-15 vardagar.
Fri frakt inom Sverige för privatpersoner.
Kan levereras innan jul!
Finns även som
Visa alla 1 format & utgåvor
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.
Visa hela texten

Passar bra ihop

  1. Location Privacy in Mobile Applications
  2. +
  3. Massive MIMO in 5G Networks: Selected Applications

De som köpt den här boken har ofta också köpt Massive MIMO in 5G Networks: Selected Applications av Long Zhao, Hui Zhao, Kan Zheng, Wei Xiang (häftad).

Köp båda 2 för 1248 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Övrig information

Bo Liu received his B.S. degree from Nanjing University of Posts and Telecommunications, China, in 2004 and his M.S. and Ph.D. degrees in 2007 and 2010, respectively, from Shanghai Jiao Tong University, Shanghai, China, all in Electrical Engineering. From 2010 to 2014, he was an Assistant/Associate Research Professor at the Electrical Engineering Department, Shanghai Jiao Tong University. He was a postdoctoral research fellow at Deakin University, Melbourne, Australia, from 2014 to 2017. He is currently a lecturer at the Department of Engineering, La Trobe University, VIC 3086, Australia. His research interests include wireless communications and networking, security, and privacy issues in wireless networks. Wanlei Zhou received his B.Eng. and M.Eng. degrees from Harbin Institute of Technology, China in 1982 and 1984, respectively, and his Ph.D. degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a D.Sc. degree from Deakin University in 2002. He is currently the Head of School of school of software in University of Technology Sydney, Australia. He was an Alfred Deakin Professor and Chair of Information Technology, School of Information Technology. Professor Zhou has published more than 300 papers in refereed international journals and conference proceedings, and he has chaired numerous international conferences. Tianqing Zhu received her B.Eng. and M.Eng. degrees from Wuhan University, China, in 2000 and 2004, respectively, and her Ph.D. in Computer Science from Deakin University, Australia, in 2014. Dr. Zhu is currently a senior lecturer in the school of software in University of Technology Sydney, Australia. Before that, she was a lecturer in the School of Information Technology, Deakin University. Her research interests include privacy preservation, data mining and network security. Yong Xiang received his B.Eng. and M.E. degrees from the University of Electronic Science and Technology of China, Chengdu, China, in 1983 and 1989, respectively. In 2003, he received his Ph.D. degree from The University of Melbourne, Australia. He is currently a Professor at the School of Information Technology at Deakin University, Melbourne, Australia. He is also the Associate Head of School (Research) and Director of the Artificial Intelligence and Data Analytics Research Cluster. His research interests include information security and privacy, multimedia (speech/image/video) processing, wireless sensor networks and IoT, and biomedical signal processing. He has authored over 160 refereed journal and conference papers in these areas. Kun Wang received his B. Eng. and Ph.D. degrees from the School of Computer Science, Nanjing University of Posts and Telecommunications, China, in 2004 and 2009, respectively. From 2013 to 2015, he was a postdoctoral fellow at the Electrical Engineering Department, University of California, Los Angeles (UCLA), USA. In 2016, he was a research fellow at the School of Computer Science and Engineering, the University of AIZU, Fukushima, Japan. He is currently a research fellow at the Department of Computing, Hong Kong Polytechnic University, China, and also a Full Professor at the School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China. He has published over 100 papers in refereed international conferences and journals. He is a senior member of the IEEE and a member of the ACM. His current research interests are mainly in big data, wireless communications and networking, smart grids, and information security technologies.

Innehållsförteckning

1. Introduction 1.1. Definition of Location Privacy 1.2. Location Privacy Risks: Attacks and Adversaries 1.3. People's View About Location Privacy 1.4. Practical Applications with Location Privacy Issues 1.5. The Unified Location Privacy Research Framework 1.6. Outline and Book Overview 2. Location Privacy Preserving Mechanisms 2.1. Introduction 2.2. Cryptography-based Mechanism 2.3. Anonymization Mechanism 2.4. Obfuscation Mechanism 2.5. Reducing Location Information Sharing 2.6. Location Privacy Metrics and Performance Evaluations 2.7. Comparisons and Discussions 3. Location Privacy in Mobile Social Network Applications 3.1. Introduction 3.2. Sensitive Location Predication by Users' Social Network Data 3.3. Protecting Important Locations in Social Networks 3.4. Summary 4. Location Privacy in Mobile Crowd Sensing Applications 4.1. Introduction 4.2. Related Works 4.3. A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Modes 4.4. Performance Evaluation 4.5. Summary 5. Location Privacy in Wireless Vehicular Networks 5.1. Introduction 5.2. Related Works 5.3. Enhancing Privacy by Content Broadcasting and Active Caching 5.4. Performance Evaluation 5.5. Summary 6. Future Directions and Conclusions 6.1. Location Privacy Protection under Correlations 6.2. Location Privacy in Big Data and Deep Learning Era 6.3. Location Privacy in Autonomous Systems 6.4. Conclusions