Information overload is a major problem for many people who use the internet. This is because there is so much information available that it can be hard to know where to start. Filtering tools, like the Recommender Sy...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ...
详细信息
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system based on Paillier encryption, which is claimed to protect both client C 's location privacy and service provider S's database privacy. However, Yang et al. presented a practical data privacy attack in INFOCOM'18, which allows a polynomial time attacker to obtain S's database. We propose a novel WiFi fingerprint localization system based on CastagnosLaguillaumie(CL) encryption, which has a trustless setup and is efficient due to the excellent properties of CL encryption. To prevent Yang et al.'s attack, the system requires that S selects only the locations from its database that can receive the nonzero signals from all the available access points in C 's nonzero fingerprint in order to determine C's location. Security analysis shows that our scheme is secure under Li et al.'s threat model. Furthermore, to enhance the security level of privacy-preserving WiFi fingerprint localization scheme based on CL encryption, we propose a secure and efficient zero-knowledge proof protocol for the discrete logarithm relations in C's encrypted localization queries.
Mental diseases, mental disorders, or psychological disorders is a large group of symptoms which causes changes to the state of mood and reflect this on the behavior of the person with the mental disorder. It affects ...
详细信息
Fish size measurement in aquatic environments plays a pivotal role in understanding fish biology, ecology, and fisheries management. This survey explores various methodologies employed for fish size measurement, empha...
详细信息
This paper investigates the secrecy capacity optimization in RF/FSO systems with mixed Rayleigh and log-normal fading, while masking eavesdroppers channel state information () as well as suffering from atmospheric tur...
详细信息
Intelligent devices often produce time series data that suffer from significant data quality issues. While the utilization of data dependency in error detection and data repair has been somewhat beneficial, it remains...
详细信息
Anomaly detection is recognized as a critical task in machine learning, particularly when applied to high-dimensional and graph structured data. Traditional clustering based methods for anomaly detection are often cha...
详细信息
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t...
详细信息
Radio Frequency Identification (RFID) is a crucial technology in the Internet of Things (IoT), enabling seamless wireless communication and data exchange. However, these technologies can pose significant security chal...
详细信息
This paper presents an approach to joint wireless and computing resource management in slice-enabled metaverse networks, addressing the challenges of inter-slice and intra-slice resource allocation in the presence of ...
详细信息
暂无评论