Privacy-preserving trajectory similarity computation method

To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted intereste...

Full description

Saved in:
Bibliographic Details
Main Authors: Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2022-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items