Research Article
Remote Surveillance System without Privacy Leakage for Contacts in Infectious Disease
Algorithm 6
Location information protection.
(1) | for each location data LI collected at each timestamp | (2) | contact encrypts the location data by | (3) | location database | (4) | end for | (5) | if contact is confirmed | (6) | hospital sends N_CD of the contact to the health center | (7) | user encrypts the by , and sends it to health center | (8) | health center decrypts the location data of the contact by | (9) | end if |
|