{"id":"https://openalex.org/W3039028614","doi":"https://doi.org/10.20532/cit.2019.1004606","title":"Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem","display_name":"Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem","publication_year":2020,"publication_date":"2020-06-30","ids":{"openalex":"https://openalex.org/W3039028614","doi":"https://doi.org/10.20532/cit.2019.1004606","mag":"3039028614"},"language":"en","primary_location":{"id":"doi:10.20532/cit.2019.1004606","is_oa":true,"landing_page_url":"https://doi.org/10.20532/cit.2019.1004606","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/4606/2329","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://cit.fer.hr/index.php/CIT/article/download/4606/2329","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056035928","display_name":"Adebukola Onashoga","orcid":"https://orcid.org/0000-0002-3561-1990"},"institutions":[{"id":"https://openalex.org/I18045400","display_name":"Federal University of Agriculture","ror":"https://ror.org/050s1zm26","country_code":"NG","type":"education","lineage":["https://openalex.org/I18045400"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Adebukola Onashoga","raw_affiliation_strings":["Federal University of Agriculture, Abeokuta, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Agriculture, Abeokuta, Nigeria","institution_ids":["https://openalex.org/I18045400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041029215","display_name":"Adesina S. Sodiya","orcid":"https://orcid.org/0000-0002-9191-8401"},"institutions":[{"id":"https://openalex.org/I18045400","display_name":"Federal University of Agriculture","ror":"https://ror.org/050s1zm26","country_code":"NG","type":"education","lineage":["https://openalex.org/I18045400"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Adesina Sodiya","raw_affiliation_strings":["Federal University of Agriculture, Abeokuta, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Agriculture, Abeokuta, Nigeria","institution_ids":["https://openalex.org/I18045400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058724019","display_name":"Idowu Ademola Osinuga","orcid":null},"institutions":[{"id":"https://openalex.org/I18045400","display_name":"Federal University of Agriculture","ror":"https://ror.org/050s1zm26","country_code":"NG","type":"education","lineage":["https://openalex.org/I18045400"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Idowu Osinuga","raw_affiliation_strings":["Federal University of Agriculture, Abeokuta, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Agriculture, Abeokuta, Nigeria","institution_ids":["https://openalex.org/I18045400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056035928"],"corresponding_institution_ids":["https://openalex.org/I18045400"],"apc_list":{"value":450,"currency":"EUR","value_usd":485},"apc_paid":{"value":450,"currency":"EUR","value_usd":485},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09367552,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"27","issue":"4","first_page":"47","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8819372653961182},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6081034541130066},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5964946746826172},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5185492634773254},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4754721224308014},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4689697027206421},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46187829971313477},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4570257365703583},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.44389089941978455},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.37555840611457825},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.362495481967926}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8819372653961182},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6081034541130066},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5964946746826172},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5185492634773254},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4754721224308014},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4689697027206421},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46187829971313477},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4570257365703583},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.44389089941978455},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.37555840611457825},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.362495481967926},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.20532/cit.2019.1004606","is_oa":true,"landing_page_url":"https://doi.org/10.20532/cit.2019.1004606","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/4606/2329","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f3d84818b4864f7cab91eb5097f2b0ba","is_oa":true,"landing_page_url":"https://doaj.org/article/f3d84818b4864f7cab91eb5097f2b0ba","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computing and Information Technology, Vol 27, Iss 4, Pp 47-63 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.20532/cit.2019.1004606","is_oa":true,"landing_page_url":"https://doi.org/10.20532/cit.2019.1004606","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/4606/2329","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3039028614.pdf","grobid_xml":"https://content.openalex.org/works/W3039028614.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W56293434","https://openalex.org/W290699399","https://openalex.org/W656588505","https://openalex.org/W1221875365","https://openalex.org/W1279320161","https://openalex.org/W1524630018","https://openalex.org/W1543526852","https://openalex.org/W1801457577","https://openalex.org/W1914411570","https://openalex.org/W2027078869","https://openalex.org/W2043650852","https://openalex.org/W2045696097","https://openalex.org/W2056773559","https://openalex.org/W2131177460","https://openalex.org/W2148797863","https://openalex.org/W2149921703","https://openalex.org/W2154654620","https://openalex.org/W2157855380","https://openalex.org/W2159024459","https://openalex.org/W2159777963","https://openalex.org/W2160322866","https://openalex.org/W2272053597","https://openalex.org/W2296905381","https://openalex.org/W2519614654","https://openalex.org/W2537158000","https://openalex.org/W2593097136","https://openalex.org/W2611637926","https://openalex.org/W2730228979","https://openalex.org/W2752737474","https://openalex.org/W2768058298","https://openalex.org/W2792069635","https://openalex.org/W2794290709","https://openalex.org/W2801291122","https://openalex.org/W2803804340","https://openalex.org/W2808336451"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W2965484163","https://openalex.org/W4232705780","https://openalex.org/W2096221836","https://openalex.org/W2017617306","https://openalex.org/W4386260070"],"abstract_inverted_index":{"Location-Based":[0],"Mobile":[1],"Services":[2],"(LBMS)":[3],"is":[4,33,97,131,150,164],"rapidly":[5],"gaining":[6],"ground":[7],"and":[8,18,31,50,64,72,84,107,115,137,192,199],"becoming":[9],"increasingly":[10],"popular,":[11],"because":[12,172],"of":[13,16,36,38,43,86,105,124,158,169],"the":[14,41,103,122,135,156],"variety":[15],"efficient":[17],"personalized":[19],"services":[20,45],"it":[21,173,187],"offers.":[22],"However,":[23],"if":[24],"users":[25,71],"are":[26],"not":[27],"guaranteed":[28],"their":[29],"privacy":[30,83,191],"there":[32,149],"no":[34,94,152],"assurance":[35],"genuineness":[37],"server's":[39,87,159],"response,":[40,88],"use":[42,104],"these":[44,128],"would":[46],"be":[47],"rendered":[48],"useless":[49],"could":[51],"deter":[52],"its":[53],"growth":[54],"in":[55,145,202],"mobile":[56],"computing.":[57],"This":[58,99],"paper":[59],"aims":[60],"to":[61,111,120,133,166],"provide":[62],"confidentiality":[63],"integrity":[65,85,157,193],"for":[66],"communication":[67],"that":[68,79,154,186],"occurs":[69],"between":[70],"location":[73],"service":[74],"providers.":[75],"A":[76],"practical":[77],"system":[78,153],"guarantees":[80],"a":[81,90,167,175],"user's":[82,138],"using":[89],"cryptographic":[91],"scheme":[92,100,163],"with":[93,127,182,194],"trusted":[95],"intermediary,":[96],"provided.":[98],"also":[101],"employs":[102],"symmetric":[106],"asymmetric":[108],"encryption":[109],"algorithms":[110],"ensure":[112],"secure":[113],"message":[114,136],"key":[116],"transfer.":[117],"In":[118],"order":[119],"overcome":[121],"problem":[123],"computational":[125],"complexities":[126],"algorithms,":[129],"AES-256":[130],"used":[132],"encrypt":[134],"location.":[139],"Several":[140],"researches":[141],"have":[142],"been":[143],"done":[144],"this":[146],"category":[147],"but":[148],"still":[151],"checks":[155],"response.":[160],"The":[161],"proposed":[162],"resistant":[165],"range":[168],"susceptible":[170],"attacks,":[171],"provides":[174],"detailed":[176],"security":[177],"analysis":[178],"and,":[179],"when":[180],"compared":[181],"related":[183],"work,":[184],"shows":[185],"can":[188],"actually":[189],"guarantee":[190],"faster":[195],"average":[196],"response":[197],"time":[198],"higher":[200],"throughput":[201],"LBMS.":[203]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
