LEADER 02889oam 2200517 450 001 9910437588603321 005 20190911103512.0 010 $a1-4614-9074-X 024 7 $a10.1007/978-1-4614-9074-6 035 $a(OCoLC)863056260 035 $a(MiFhGG)GVRL6XAV 035 $a(EXLCZ)993710000000024315 100 $a20130820d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aLocation privacy protection in mobile networks /$fXinxin Liu, Xiaolin Li 205 $a1st ed. 2013. 210 1$aNew York :$cSpringer,$d2013. 215 $a1 online resource (xii, 75 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $a"ISSN: 2191-5768." 311 $a1-4614-9073-1 320 $aIncludes bibliographical references. 327 $aIntroduction -- Privacy Preservation Using Multiple Mix Zones -- Privacy Preservation Using Game-Theoretic Approach -- Privacy Preservation Using Logical Coordinates -- Conclusion and Future Directions. 330 $aThis SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well. 410 0$aSpringerBriefs in computer science. 606 $aComputer security 606 $aMobile communication systems$xSecurity measures 606 $aComputer networks$xSecurity measures 606 $aData encryption (Computer science) 615 0$aComputer security. 615 0$aMobile communication systems$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 615 0$aData encryption (Computer science) 676 $a004.6 700 $aLiu$b Xinxin$4aut$4http://id.loc.gov/vocabulary/relators/aut$01058324 702 $aLi$b Xiaolin 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910437588603321 996 $aLocation Privacy Protection in Mobile Networks$92499241 997 $aUNINA LEADER 01507nam 2200385z- 450 001 9910689699003321 005 20161209102759.0 035 $a(CKB)5860000000025288 035 $a(BIP)008679697 035 $a(EXLCZ)995860000000025288 100 $a20220406c2003uuuu -u- - 101 0 $aeng 200 10$aHispanic health $eproblems with coverage, access, and health disparities : hearing before the Subcommittee on Public Health of the Committee on Health, Education, Labor, and Pensions, United States Senate, One Hundred Seventh Congress, second session, on examining Hispanic health problems, focusing on coverage, access, and health disparities, September 23, 2002 215 $a1 online resource (iii, 80 p.) 311 $a0-16-069719-0 517 $aHispanic health 606 $aHispanic Americans$xMedical care 606 $aHispanic Americans$xHealth and hygiene 606 $aHealth insurance$zUnited States 606 $aHealth services accessibility$zUnited States 610 $aHispanic americans 610 $aHealth insurance 610 $aHealth services accessibility 610 $aUnited States 610 $aSocial science 610 $aBusiness & economics 610 $aMedical 615 0$aHispanic Americans$xMedical care. 615 0$aHispanic Americans$xHealth and hygiene. 615 0$aHealth insurance 615 0$aHealth services accessibility 906 $aBOOK 912 $a9910689699003321 996 $aHispanic health$93133172 997 $aUNINA