K-anonymity location cloaking algorithms Saudi Arabia

Evaluation of an entropy based k-anonymity model for Location Based. Loc-Auth: Location-Enabled Authentication. (King Abdulaziz University, Saudi Arabia);.

A Research Survey RFID Security & Privacy Issue | Radio

ICNC program web page - conf-icnc.org

Evaluation of an entropy based k-anonymity model for Location Based. Loc-Auth: Location-Enabled Authentication. (King Abdulaziz University, Saudi Arabia);...“Information security and privacy” is one of the major challenges in the communication world of IT as each and every information we pass need to be secured enough.A personalized two-tier cloaking scheme for privacy-aware location. Evaluation of an entropy-based k-anonymity model for location. Jeddah, Saudi Arabia.

CSDL - 2015 International Conference on Computing

Trusted Base Stations-Based Privacy Preserving Technique in Location. Jeddah, Saudi Arabia. W., 2009), method to use cloaking box with k-anonymity (Hu.

Links: