Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
暂无分享,去创建一个
Min Wu | Hui Wang | Haiping Huang | Yunqi Wang | Yuxiang Qin | Yu Qin | Haiping Huang | Min Wu | Hui Wang | Yunqi Wang
[1] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[2] Yuqing Sun,et al. Historical Trajectories Based Location Privacy Protection Query , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.
[3] Saroj Kaushik,et al. K Anonymity Based on Fuzzy Spatio-temporal Context , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.
[4] Chi-Yin Chow,et al. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.
[5] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[6] Hossein Pishro-Nik,et al. Achieving perfect location privacy in Markov models using anonymization , 2016, 2016 International Symposium on Information Theory and Its Applications (ISITA).
[7] Dongwoo Kang,et al. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain , 2016, Secur. Commun. Networks.
[8] Ling Liu,et al. A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .
[9] Wang Lu,et al. Location Privacy Preservation in Big Data Era: A Survey , 2014 .
[10] M.O. Gheorghita,et al. Location Privacy in Chain-Based Protocols for Location-Based Services , 2008, 2008 The Third International Conference on Digital Telecommunications (icdt 2008).
[11] Milena Radenkovic,et al. The quest for location-privacy in opportunistic mobile social networks , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[12] Ken C. K. Lee,et al. High utility K-anonymization for social network publishing , 2013, Knowledge and Information Systems.
[13] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[14] Dai Jiazhu,et al. A location authentication scheme based on proximity test of location tags , 2013 .
[15] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[16] Fengli Zhang,et al. Non-deterministic K-anonymity Algorithm Based Untrusted Third Party for Location Privacy Protection in LBS , 2015 .
[17] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[18] Marco Gruteser,et al. USENIX Association , 1992 .