References
- S. Shafiee, H. Shafiee and F. Mortazavi, "Security of crowd sourcing," 2016 10th International Conference on e-Commerce in Developing Countries: with focus on e-Tourism (ECDC), Isfahan, 2016, pp. 1-6.doi: 10.1109/ECDC.2016.7492978
- X. Zheng, P. Maille, C. T. P. Le and S. M. Swid, "Trust Mechanisms for Efficiency Improvement in Collaborative Working Environments," 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Miami Beach, FL, 2010, pp. 465-467.
- Nidhi Singhal and JPS Raina, "Comparative analysis of AES and RC4 for better utilization, International journal on computer trends and technology, ISSN 2231, 2011
- Simar Preet Singh, and Raman Maini, "COMPARISON OF DATA ENCRYPTION ALGORITHMS", International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 125-127
- Guillermo A. Francia III MCIS & Rahjima R. Francia "An Empirical Study on the Performance of Java/.Net Cryptographic APIs", Information Systems Security, 16:6, 344-354, DOI: 10.1080/10658980701784602
- B. N. Jagdale, J. W. Bakal, "Issues of Cryptographic Performance in Resource Constrained Devices Experimental Study", International Conference on Intelligent Computing & Communication -2017, ISBN 978-981-10-7245-1, publication by Advances in Intelligent Systems & Computing (AISC), Springer, August 2017. https://doi.org/10.1007/978-981-10-7245-1_44
- Y. Pu, J. Luo, Y. Wang, C. Hu, Y. Huo and J. Zhang, "Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach," 2018 IEEE Symposium on Privacy-Aware Computing (PAC), 2018, pp. 125-126, doi: 10.1109/PAC.2018.00022.
- J. Zhou, Z. Cao, Z. Qin, X. Dong and K. Ren, "LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 420-434, 2020, doi: 10.1109/TIFS.2019.2923156.
- Levent Ertaul, Nitu J. Chavan, "Privacy in Location Based Services (LBS) via Composite Functions: The L4NE Protocol", IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3, March 2017
- G. Chen et al., "Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection," in IEEE Access, vol. 7, pp. 101704-101717, 2019, doi: 10.1109/ACCESS.2019.2931056.
- C. Shouqi, L. Wanrong, C. Liling, S. Qing and H. Xin, "An Improved Anonymous Authentication Protocol for Location-Based Service," in IEEE Access, vol. 7, pp. 114203-114212, 2019, doi: 10.1109/ACCESS.2019.2930740.
- P. Asuquo et al., "Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges, and Countermeasures," in IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4778-4802, Dec. 2018, doi: 10.1109/JIOT.2018.2820039.
- X. Li, T. Liu, M. S. Obaidat, F. Wu, P. Vijayakumar and N. Kumar, "A Lightweight Privacy-Preserving Authentication Protocol for VANETs," in IEEE Systems Journal, vol. 14, no. 3, pp. 3547-3557, Sept. 2020, doi: 10.1109/JSYST.2020.2991168.
- L. Yu, X. Su and L. Zhang, "Collaboration-Based Location Privacy Protection Method," 2019 IEEE 2nd International Conference on Electronics Technology (ICET), 2019, pp. 639-643, doi: 10.1109/ELTECH.2019.8839605.
- L. Zheng, H. Yue, L. Zhang and X. Pan, "A New Location Privacy Protection Algorithm," 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017, pp. 364-367, doi: 10.1109/CSE-EUC.2017.253.
- K. M. Mahesh Kumar and N. R. Sunitha, "Preserving Location Data Integrity in Location Based Servers using Blockchain Technology," 2017 2nd International Conference On Emerging Computation and Information Technologies (ICECIT), 2017, pp. 1-6, doi: 10.1109/ICECIT.2017.8453286.
- E. Elmahdi and S. -M. Yoo, "Secure Data Integrity in VANETs based on CS-DC Scheme," 2020 IEEE Latin-American Conference on Communications (LATINCOM), 2020, pp. 1-5, doi: 10.1109/LATINCOM50620.2020.9282267.
- B. N. Jagdale, J. W. Bakal, "Privacy Aware Monitoring of Mobile Users in Sensor Networks Environment", iJIM International Journal: Interactive Mobile Technologies DOI:10.3991/ijim.v13i02.10023, eISSN: 1865-7923, iJIM Vol. 13, No. 2, Pages 127-140, 2019
- Turki Kordy, Fazal Noor and Oussama Benrhouma, "Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography", IJCSNS International Journal of Computer Science and Network Security, VOL.21 No.10, October 2021