Privacy-preserving trajectory similarity computation method
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted intereste...
Saved in:
Main Authors: | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022223/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Privacy-preserving mining of association rules based on paillier encryption algorithm
by: Huan XING, et al.
Published: (2016-01-01) -
Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption
by: Hong Cheng
Published: (2025-01-01) -
Privacy-preserving digital rights management scheme in cloud computing
by: Qin-long HUANG, et al.
Published: (2014-02-01) -
A Privacy Preserving Method in WSN
by: Ping Qian, et al.
Published: (2013-01-01) -
Privacy-preserving convolutional neural network inference scheme based on homomorphic ciphertext transformation
by: LI Ruiqi, et al.
Published: (2024-10-01)