Privacy Protection Through k.anonymity in Location.based Services
暂无分享,去创建一个
[1] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[2] Mohamed F. Mokbel,et al. Identifying Unsafe Routes for Network-Based Trajectory Privacy , 2009, SDM.
[3] Sushil Jajodia,et al. Anonymity in Location-Based Services: Towards a General Framework , 2007, 2007 International Conference on Mobile Data Management.
[4] Vijayalakshmi Atluri,et al. Ensuring Privacy and Security for LBS through Trajectory Partitioning , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[5] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[6] David Kotz,et al. AnonySense: Opportunistic and Privacy-Preserving Context Collection , 2009, Pervasive.
[7] Aris Gkoulalas-Divanis,et al. A Free Terrain Model for Trajectory K-Anonymity , 2008, DEXA.
[8] Josep Domingo-Ferrer,et al. Microaggregation for Database and Location Privacy , 2006, NGITS.
[9] Baik Hoh. Achieving guaranteed anonymity in time-series location data , 2008 .
[10] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[11] Urs Hengartner,et al. A distributed k-anonymity protocol for location privacy , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[12] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[13] Claudio Bettini,et al. A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation , 2007, 2007 International Conference on Mobile Data Management.
[14] Nick Roussopoulos,et al. K-Nearest Neighbor Search for Moving Query Point , 2001, SSTD.
[15] Panos Kalnis,et al. Providing K-Anonymity in location based services , 2010, SKDD.
[16] Jimeng Sun,et al. The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries , 2003, VLDB.
[17] Hanan Samet,et al. The Design and Analysis of Spatial Data Structures , 1989 .
[18] Rajeev Motwani,et al. Approximation Algorithms for k-Anonymity , 2005 .
[19] Ben Y. Zhao,et al. StarClique: guaranteeing user privacy in social networks against intersection attacks , 2009, CoNEXT '09.
[20] Aris Gkoulalas-Divanis,et al. A k-Anonymity Model for Spatio-Temporal Data , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.
[21] Agusti Solanas,et al. Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.
[22] Yufei Tao,et al. Continuous Nearest Neighbor Search , 2002, VLDB.
[23] X. S. Wang,et al. Preserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated , 2007 .
[24] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[25] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[26] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[27] Jamalul-lail Ab Manan,et al. Privacy preservation in Location-Based Services (LBS) through Trusted Computing technology , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).
[28] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[29] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[30] Hassan Takabi,et al. A collaborative k-anonymity approach for location privacy in location-based services , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[31] Josep Domingo-Ferrer,et al. Location Privacy in Location-Based Services: Beyond TTP-based Schemes , 2008, PiLBA.
[32] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[33] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[34] Hua Lu,et al. Location Privacy Techniques in Client-Server Architectures , 2009, Privacy in Location-Based Applications.
[35] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[36] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[37] Marco Gruteser,et al. USENIX Association , 1992 .
[38] Panayiotis Bozanis,et al. A network aware privacy model for online requests in trajectory data , 2009, Data Knowl. Eng..