Volume 6 Number 4 December 2015

    
Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints

Lan Sun, Ying-jie Wu, Zhao Luo, Yi-lei Wang

https://doi.org/

Abstract Within the field of data privacy preserving research, privacy preserving Location-based Services for mobile users in road networks is a topic of great concern in recent years. However, most previous works on location privacy protection in road networks adopt spatial cloaking techniques, which may easily suffer replay attack. In addition, existing solutions for resisting replay attack generally add some randomized mechanisms into the... Read More


Intrusion Object Detection of a Randomized Scheduling Algorithm in Wireless Sensor Network

Quangang Zhao

https://doi.org/

Abstract In wireless sensor networks, which can be configured to put some sensor nodes in sleep mode to save energy. This approach is a special case of a randomized scheduling algorithm, in which k subsets of sensors work alternatively. In this paper, we first study the performance of the randomized scheduling algorithm via both analysis and simulation in terms of intrusion coverage intensity, and... Read More


Study on Relationship of Cyber Customer Satisfaction and Loyalty

Yong Yang

https://doi.org/

Abstract With the rapid development of Internet technology, cyber shopping has become the major current of customer buying. Hyper competition requires the sellers to find effective way to break through from the cyber marketing; as the effective way to achieve competitive advantage, the customer loyalty has been the concentration of scholars and entrepreneurs. This paper attempts to study on the relationship between customer satisfaction... Read More