Quantifying Location Privacy: The Case of Sporadic Location Exposure
暂无分享,去创建一个
[1] J. Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Reza Shokri,et al. Evaluating the Privacy Risk of Location-Based Services , 2011, Financial Cryptography.
[3] Carmela Troncoso,et al. Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.
[4] David K. Y. Yau,et al. Privacy vulnerability of published anonymous mobility traces , 2010, MobiCom.
[5] Reza Shokri,et al. A distortion-based metric for location privacy , 2009, WPES '09.
[6] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[7] Philippe Golle,et al. On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.
[8] Matthias Grossglauser,et al. CRAWDAD dataset epfl/mobility (v.2009-02-24) , 2009 .
[9] Yoni De Mulder,et al. Identification via location-profiling in GSM networks , 2008, WPES '08.
[10] Carmela Troncoso,et al. Perfect Matching Disclosure Attacks , 2008, Privacy Enhancing Technologies.
[11] Hui Xiong,et al. Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.
[12] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[13] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[14] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[15] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[16] M. Gruteser,et al. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking , 2003, MobiSys '03.
[17] Reza Shokri,et al. A Unified Framework for Location Privacy , 2010 .
[18] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[19] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .