Communications and Networking
暂无分享,去创建一个
[1] S. Sitharama Iyengar,et al. Pseudonym-based anonymity zone generation for mobile service with strong adversary model , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[2] Reza Shokri,et al. Privacy Games: Optimal User-Centric Data Obfuscation , 2014, Proc. Priv. Enhancing Technol..
[3] Chunguang Ma,et al. A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS , 2015, Int. J. Distributed Sens. Networks.
[4] Juan Qu,et al. An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme , 2013, J. Electr. Comput. Eng..
[5] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[6] Marat V. Burnashev,et al. Generalized Superposition Modulation and Iterative Demodulation: A Capacity Investigation , 2010, J. Electr. Comput. Eng..
[7] Jianliang Xu,et al. Privacy-Conscious Location-Based Queries in Mobile Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.
[8] Tanzima Hashem,et al. Countering overlapping rectangle privacy attack for moving kNN queries , 2013, Inf. Syst..
[9] Yong Wang,et al. Achieving Absolute Privacy Preservation in Continuous Query Road Network Services , 2014, ADMA.
[10] Reza Hoshyar,et al. Novel Low-Density Signature for Synchronous CDMA Systems Over AWGN Channel , 2008, IEEE Transactions on Signal Processing.
[11] Sang-Kook Han,et al. Indoor Location Estimation Based on LED Visible Light Communication Using Multiple Optical Receivers , 2013, IEEE Communications Letters.
[12] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[13] Swaroop Ghosh,et al. Data privacy in non-volatile cache: Challenges, attack models and solutions , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).