A Survey on Preserving Privacy towards Location Proof
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
Location proof of a particular person relies on his/her mobile device position. One of the valuable features of the location proofs tells about accessing the location based services (LBS) by using mobile device. Location privacy is mandatory for every user to keep their location confidential .Every user needs to maintain the privacy level according to their spatial and temporal region. In this paper, we have presented a survey about the various techniques that are well suited to preserve location privacy and location proofs
Authors and Affiliations
Senthilguru S , Blessed prince P
Design and VLSI Implementation of DIP Based Rod Quality Inspection
The inspection of product quality in majority of cases is based on human factor because of complexities of problems of inspection and quality and demands for the changeability during decision about the quality of product...
A Verification Method Based On Petri Net for Online Student Registration Web Service Composition
The Main area in Web service is the Web service composition which detects the composition before execution. Petri net or Place / Transition net is a mathematical modeling language used to describe the distributed...
Semantic Knowledge at User side through Web Browser P lug in : A Revie w
T he semantic web is the web in which searching is based on the meaning of words . It provides the semantic knowledge to the user in a structured format. Semantic web is not the link between web pages it is the...
A Comparative based study of Different Video-Shot Boundary Detection algorithms
A shot in a digital video sequence may be defined as a set of images (frames) from a single camera. A shot boundary is determined when one shot changes to another shot. A scene is a collection of one or more shots...
RSA algorithm realization on FPGA
The RSA algorithm is a secure, high quality, public key algorithm..The paper presents the architecture and modeling of RSA public key encryption/decryption systems. It is been observed that it is difficult to implement R...