To obtain access to full text of journal and articles you must register!
- Article name
- On the possibility of hiding the geolocation of a subscriber of a cellular network using methods of secure computation
- Authors
- Kazarin O. V., , okaz2005@yandex.ru, Institute of Information Sciences and Security Technologies of the Russian State Humanitarian University, Moscow, Russia
- Keywords
- secure computation / secure function evaluation / two-party protocols of information interaction / multi-party protocols of information interaction
- Year
- 2016 Issue 1 Pages 39 - 47
- Code EDN
- Code DOI
- Abstract
- It is shown the possibility of the construction and proof of the safety of the secure computation protocols to hide the coordinates of the moving point relative to some polygon and the possibility of practical construction of the protocols with good communication characteristics. The developed protocols can be useful in modeling the process of hiding the geolocation of subscriber of a prospective cellular network during its movement along the route within cells of the network. This technology will protect users against attackers who analyzing the information (traffic) in the network, trying to learn exactly where is this subscriber and where he was held until a specific point in time, from where he made calls, to which cellular network operator he belonged.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy