Time obfuscation-based privacy-preserving scheme for Location-Based Services
暂无分享,去创建一个
Fenghua Li | Hui Li | Sheng Wan | Ben Niu | Yuanyuan He
[1] Gianluca Dini,et al. Uniform Obfuscation for Location Privacy , 2012, DBSec.
[2] Kang G. Shin,et al. Anatomization and Protection of Mobile Apps' Location Privacy Threats , 2015, USENIX Security Symposium.
[3] Alec Wolman,et al. Enabling new mobile applications with location proofs , 2009, HotMobile '09.
[4] Injong Rhee,et al. SLAW: A New Mobility Model for Human Walks , 2009, IEEE INFOCOM 2009.
[5] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[6] Jian Lu,et al. JointCache: Collaborative path confusion through lightweight P2P communication , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[7] Varun Sharma,et al. Evaluation of an entropy-based k-anonymity model for location based services , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[8] Xinwen Fu,et al. Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.
[9] Guangzhong Sun,et al. A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories , 2014, 2014 IEEE International Conference on Data Mining Workshop.
[10] Kang G. Shin,et al. Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.
[11] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[12] Hui Li,et al. A personalized two-tier cloaking scheme for privacy-aware location-based services , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[13] Hui Li,et al. EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.
[14] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[15] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[16] Qinghua Li,et al. Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[17] Jean-Pierre Hubaux,et al. Privacy in Mobile Computing for Location-Sharing-Based Services , 2011, PETS.
[18] Urs Hengartner,et al. VeriPlace: a privacy-aware location proof architecture , 2010, GIS '10.
[19] Nitesh Saxena,et al. Cover locations: availing location-based services without revealing the location , 2011, WPES '11.
[20] Kyunghan Lee,et al. On the Levy-Walk Nature of Human Mobility , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[21] Panagiotis Papadimitratos,et al. Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .
[22] Kang G. Shin,et al. Location Privacy Protection for Smartphone Users , 2014, CCS.
[23] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[24] Hua Lu,et al. PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.