DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 4 Issue 1 Date of Publication:   June 2015

Mobile User Privacy Preserving Location based Queries and Preventing Location-Based Server Contents

Salman Siddiqui,Gambhir Halse

Page(s):   9-11 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.004.001.003 Publisher:   Integrated Intelligent Research (IIR)


  1. Beresford, F. Stajano,   "Location Privacy in PervasiveComputing   ,2012
    View Artical

  2. Hoh and M. Gruteser,   "Protecting location privacythrough path confusion   ,2005
    View Artical

  3. Damiani ML, Bertino E, Silvestri C,   "The probeframework for the personalized cloaking of privatelocations   ,2010
    View Artical

  4. G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino,   "Approximate and exact hybrid algorithms for privatenearest-neighbor queries with databaseprotection",   GeoInformatica   ,2010
    View Artical

  5. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi,and K.-L. Tan,   "Private queries in location basedservices: anonymizers are not necessary   ,2008
    View Artical

  6. G. Ghinita, C. R. Vicente, N. Shang, and E. Bertino,   "Privacy preserving matching of spatial datasets withprotection against background knowledge   ,2010
    View Artical

  7. M. Gruteser and D. Grunwald,   "Anonymous usage of location based services through spatial and temporalcloaking",   Proc. 1st international conference on Mobilesystem   ,2003
    View Artical

  8. T. Hashem and L. Kulik,   "Safeguarding location privacyin wireless adhoc networks   ,2007
    View Artical

  9. M. Bellare and S. Micali,   "Non-interactive oblivioustransfer and applications   ,1990
    View Artical

  10. Damiani ML, Bertino E, Silvestri C,   "The probeframework for the personalized cloaking of privatelocations   ,2010
    View Artical

  11. M. Bellare and S. Micali,   "Non-interactive oblivioustransfer and applications   ,1990
    View Artical