LEADER 02889oam 2200517 450 001 9910437588603321 005 20190911103512.0 010 $a1-4614-9074-X 024 7 $a10.1007/978-1-4614-9074-6 035 $a(OCoLC)863056260 035 $a(MiFhGG)GVRL6XAV 035 $a(EXLCZ)993710000000024315 100 $a20130820d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aLocation privacy protection in mobile networks /$fXinxin Liu, Xiaolin Li 205 $a1st ed. 2013. 210 1$aNew York :$cSpringer,$d2013. 215 $a1 online resource (xii, 75 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $a"ISSN: 2191-5768." 311 $a1-4614-9073-1 320 $aIncludes bibliographical references. 327 $aIntroduction -- Privacy Preservation Using Multiple Mix Zones -- Privacy Preservation Using Game-Theoretic Approach -- Privacy Preservation Using Logical Coordinates -- Conclusion and Future Directions. 330 $aThis SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well. 410 0$aSpringerBriefs in computer science. 606 $aComputer security 606 $aMobile communication systems$xSecurity measures 606 $aComputer networks$xSecurity measures 606 $aData encryption (Computer science) 615 0$aComputer security. 615 0$aMobile communication systems$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 615 0$aData encryption (Computer science) 676 $a004.6 700 $aLiu$b Xinxin$4aut$4http://id.loc.gov/vocabulary/relators/aut$01058324 702 $aLi$b Xiaolin 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910437588603321 996 $aLocation Privacy Protection in Mobile Networks$92499241 997 $aUNINA