Author of the publication

k-Nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services.

, , , , and . J. Syst. Archit., 58 (9): 354-371 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering-Based Query Result Authentication for Encrypted Databases in Cloud., , , and . HPCC/CSS/ICESS, page 1076-1082. IEEE, (2014)A New K-NN Query Processing Algorithm Enhancing Privacy Protection in Location-Based Services., and . CIT, page 421-428. IEEE Computer Society, (2011)A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services., and . GPC, volume 7861 of Lecture Notes in Computer Science, page 526-535. Springer, (2013)A New Grid-Based Cloaking Scheme for Continuous Queries in Centralized LBS Systems., , , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 345-352. Springer, (2013)A Density-Aware Data Encryption Scheme for Outsourced Databases in Cloud Computing., , , and . HPCC/CSS/ICESS, page 1097-1104. IEEE, (2014)Full-wave analysis of microwave scattering from short vegetation: an investigation on the effect of multiple scattering., , and . IEEE Trans. Geosci. Remote. Sens., 40 (11): 2522-2526 (2002)k-Nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services., , , , and . J. Syst. Archit., 58 (9): 354-371 (2012)A New Energy-Efficient Cluster-Based Routing Protocol Using a Representative Path in Wireless Sensor Networks., , and . Int. J. Distributed Sens. Networks, (2014)A New K-NN Query Processing Algorithm Enhancing Privacy Protection in Location-Based Services., , and . IEEE MS, page 17-24. IEEE Computer Society, (2012)A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing., , , and . IJDWM, 10 (4): 26-49 (2014)