Privacy-preserving event detection in pervasive spaces
暂无分享,去创建一个
Nalini Venkatasubramanian | Sharad Mehrotra | Jehan Wickramasuriya | Bijit Hore | Daniel Massaguer | Daniel Massaguer | S. Mehrotra | N. Venkatasubramanian | B. Hore | Jehan Wickramasuriya
[1] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[2] Anna Lubiw,et al. Some NP-Complete Problems Similar to Graph Isomorphism , 1981, SIAM J. Comput..
[3] Klaus R. Dittrich,et al. Detecting composite events in active database systems using Petri nets , 1994, Proceedings of IEEE International Workshop on Research Issues in Data Engineering: Active Databases Systems.
[4] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[5] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[6] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[7] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Roy H. Campbell,et al. Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[11] Roy H. Campbell,et al. Towards Security and Privacy for Pervasive Computing , 2002, ISSS.
[12] William G. Griswold,et al. Challenge: ubiquitous location-aware computing and the "place lab" initiative , 2003, WMASH '03.
[13] Peter R. Pietzuch,et al. A Framework for Event Composition in Distributed Systems , 2003, Middleware.
[14] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[15] Roy H. Campbell,et al. A Middleware-Based Application Framework for Active Space Applications , 2003, Middleware.
[16] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[17] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[18] Ramakant Nevatia,et al. An Ontology for Video Event Representation , 2004, 2004 Conference on Computer Vision and Pattern Recognition Workshop.
[19] Mohan Trivedi,et al. The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.
[20] Nalini Venkatasubramanian,et al. Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.
[21] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[22] Sharath Pankanti,et al. Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.
[23] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[24] Stefan Hougardy,et al. A linear-time approximation algorithm for weighted matchings in graphs , 2005, TALG.
[25] Paddy Nixon,et al. Towards self-protecting ubiquitous systems: monitoring trust-based interactions , 2005, Personal and Ubiquitous Computing.
[26] Johannes Gehrke,et al. Towards Expressive Publish/Subscribe Systems , 2006, EDBT.
[27] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[28] Facultad de Ingenieria,et al. Oxygen: Pervasive Human-Centered Computing , 2006 .
[29] Vladimir A. Oleshchuk,et al. Privacy Preserving Monitoring and Surveillance in Sensor Networks , 2007, ISPA Workshops.
[30] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[31] Ramesh C. Jain,et al. Design and Implementation of a Middleware for Sentient Spaces , 2007, 2007 IEEE Intelligence and Security Informatics.
[32] Rafail Ostrovsky,et al. Private Searching on Streaming Data , 2005, Journal of Cryptology.
[33] U. N. Okorafor,et al. Security and Privacy for Distributed Multimedia Sensor Networks , 2008, Proceedings of the IEEE.