Privacy-Preserving Optimal Convention site Grit on Mobile Devices
Nadir Zeeshan, Y.Praveen Kumar, G.Arun Kumar, P.Madhu Sudhan,
Affiliations Department Of IT, G.Pullaiah College of Engineering and Technology. Kurnool JNTU Anatapur, Andhra Pradesh, India
-Readied with dynamic sensible telephones and cell phones, today's greatly interconnected urban populace is more
energetic about these gadgets to get ready and organize their day by day lives. Location-Sharing-Based Services (LSBS)
supplement Area Based Administrations by exploitation areas from a gathering of clients, and not just people, to create some
contextualized administration upheld the areas inside the group. Notwithstanding, there is a unit developing issues concerning the
abuse of area data by outsiders that fills the need for a considerable measure of security controls in such administrations. We
have a tendency to address the important disadvantage of protection LSBSs by giving sensible and elective answers for the
security downside in one such administration, especially the fair rendezvous purpose (FRVP) determination administration. The
privacy protective FRVP (PPFRVP) disadvantage is general enough and pleasantly catches the calculations and security
necessities in LSBs. Among this paper; we have a tendency to propose privacy-preserving algorithms for significant Partner in
nursing ideal gathering area for a gaggle of clients. We have a tendency to perform a radical security investigation by formally
measuring protection loss of the planned methodologies.
Nadir Zeeshan,Y.Praveen Kumar,G.Arun Kumar,P.Madhu Sudhan."Privacy-Preserving Optimal Convention site Grit on Mobile Devices". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.1, Issue 04,pp.220-224, OCTOBER - 2014, URL :https://ijcert.org/ems/ijcert_papers/V1I49.pdf,
1. F. Berger, R. Klein, D. Nussbaum, J.-R. Sack, and J. Yi.
A meeting scheduling problem respecting time and
space. GeoInformatica, 2009.
2. D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf
formulas on ciphertexts. In Theory of Cryptography.
3. C. Cachin and R. Strobl. Asynchronous group key
exchange with failures. In ACM PODC '04, 2004.
4. C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. M.
McCune, A. Studer, A. Per-rig, B.-Y. Yang, and T.-C. Wu.
Gangs: Gather, authenticate 'n group securely. In ACM
MobiCom '08, 2008.
5. M. Chignell, A. Quan-Haase, and J. Gwizdka. The
privacy attitudes questionnaire (paq): initial
development and validation. In Human Factors and
Ergonomics Society Annual Meeting Proceedings, 2003.
6. T. ElGamal. A public key cryptosystem and a
signature scheme based on discrete logarithms. IEEE
Transactions on Information Theory, 31, 1985.
10. K. B. Frikken and M. J. Atallah. Privacy preserving
route planning. In WPES '04, 2004.
11. O. Goldreich. Foundations of cryptography: Basic
applications. Cambridge University Press, 2004.
12. J. Krumm. A survey of computational location
privacy. Personal and Ubiquitous Computing,
13. J. Lewis. IBM computer usability satisfaction
questionnaires: psychometric evaluations and
instructions for use. International Journal of HumanComputer Inter-action, 7, 1995.
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.