Optimal strategies for defending location inference attack in database-driven CRNs
暂无分享,去创建一个
[1] Behnam Bahrak,et al. Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).
[2] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[3] Zhenfu Cao,et al. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.
[4] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[5] Sumit Roy,et al. Capacity Considerations for Secondary Networks in TV White Space , 2015, IEEE Transactions on Mobile Computing.
[6] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[7] Lei Zhu,et al. Protocol to Access White-Space (PAWS) Databases , 2015, RFC.
[8] Haojin Zhu,et al. All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.
[9] Qian Zhang,et al. Location Privacy Preservation in Cognitive Radio Networks , 2014, SpringerBriefs in Computer Science.