Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing

  • David FörsterEmail author


In Chapter 3, we evaluated privacy protection in the context of V2X-based safety applications, and in Chapter 4, we proposed a pseudonym system with strong privacy guarantees. These protection mechanisms on the lower layers are the precondition for privacy-friendly applications on higher layers. In this chapter, we examine a scenario where privacy protection must be balanced with application requirements.


Communication Overhead Accuracy Level Line Graph Privacy Protection Secret Sharing Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden GmbH 2017

Authors and Affiliations

  1. 1.Institute of Distributed SystemsUlm UniversityULMGermany

Personalised recommendations