Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

online trajectory protection

biblio

Visible to the public Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT

Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
  • maximum entropy methods
  • probability
  • anonymity
  • Trajectory
  • k-anonymity
  • cloud computing technology
  • k-anonymity-based dummy generation algorithms
  • location based services
  • location-based services
  • maximum entropy
  • Metrics
  • offline trajectory data protection
  • offline trajectory protection
  • online trajectory protection
  • real-time trajectory privacy protection
  • time-dependent query probability
  • trajectory protection
  • trajectory protection scheme
  • trajectory publication
  • transition probability
  • Cloud Computing
  • security of data
  • Servers
  • IoT
  • pubcrawl
  • Human behavior
  • resilience
  • Resiliency
  • security
  • privacy
  • Internet of Things
  • Computational modeling
  • Entropy
  • composability
  • mobile computing
  • edge computing
  • Fog computing
  • Data protection
  • Security analysis

Terms of Use  |  ©2023. CPS-VO