Location privacy through secret sharing techniques
暂无分享,去创建一个
[1] Dogan Kesdogan,et al. Analysis of Security and Privacy in Mobile-IP , 1996 .
[2] Bradford W. Parkinson,et al. Development of Indoor Navigation System using Asynchronous Pseudolites , 2000 .
[3] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[4] Roy H. Campbell,et al. Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[5] Gaetano Borriello,et al. SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Andy Hopper,et al. The Anatomy of a Context-Aware Application , 2002, Wirel. Networks.
[8] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[9] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[10] Dharma P. Agrawal,et al. GPS: Location-Tracking Technology , 2002, Computer.
[11] Stathes Hadjiefthymiades,et al. Brokering Positioning Data From Heterogeneous Infrastructures , 2004, Wirel. Pers. Commun..
[12] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[13] Jeff Magee,et al. Security Considerations for a Distributed Location Service , 1998, Journal of Network and Systems Management.
[14] M. Dennis Mickunas,et al. Routing through the Mist : Design and Implementation , 2002 .
[15] Tom Rodden,et al. A lightweight approach to managing privacy in location-based services , 2002 .
[16] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[17] Peter Reichl,et al. Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks , 1998, ESORICS.
[18] Ted Kremenek,et al. A Probabilistic Room Location Service for Wireless Networked Environments , 2001, UbiComp.
[19] Dogan Kesdogan,et al. Variable and scalable security: protection of location information in mobile IP , 1996, Proceedings of Vehicular Technology Conference - VTC.
[20] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[21] A. Harter,et al. The Anatomy of a ContextAware Application , 1999, MobiCom 1999.
[22] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[23] Andy Hopper,et al. The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.
[24] Robert P. Minch,et al. Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.