REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks
暂无分享,去创建一个
[1] Chi-Yin Chow,et al. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.
[2] Ling Liu,et al. Privacy-Aware Mobile Services over Road Networks , 2009, Proc. VLDB Endow..
[3] B. N. Jagdale,et al. Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks , 2012 .
[4] Andy Hopper,et al. The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.
[5] Murat Demirbas,et al. FLOC : A Fast Local Clustering Service for Wireless Sensor Networks , 2004 .
[6] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[7] Anthony Ephremides,et al. The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm , 1981, IEEE Trans. Commun..
[8] Chi-Yin Chow,et al. Differentially Private Location Recommendations in Geosocial Networks , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.
[9] Adrian Perrig,et al. ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.
[10] Einar Snekkenes,et al. Concepts for personal location privacy policies , 2001, EC '01.
[11] Mrs. K. Valarmathi,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks , 2016 .
[12] Rajeev Motwani,et al. Anonymizing Tables , 2005, ICDT.
[13] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[14] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[15] Robert P. Minch,et al. Legal and Ethical Implications of Employee Location Monitoring , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[16] Chi-Yin Chow,et al. Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks , 2008, SIGMOD Conference.
[17] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[18] Panos Kalnis,et al. MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.
[19] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[20] Bhiksha Raj,et al. Large Margin Gaussian Mixture Models with Differential Privacy , 2012, IEEE Transactions on Dependable and Secure Computing.
[21] Wei-Shinn Ku,et al. PROS: a peer-to-peer system for location privacy protection on road networks , 2009, GIS.
[22] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[23] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[24] JoAnne Holliday,et al. Distributed Energy-Efficient Hierarchical Clustering for Wireless Sensor Networks , 2005, DCOSS.
[25] Lin Yao,et al. Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[26] David Poole,et al. Linear Algebra: A Modern Introduction , 2002 .
[27] Grammati E. Pantziou,et al. A k-anonymity privacy-preserving approach in wireless medical monitoring environments , 2012, Personal and Ubiquitous Computing.
[28] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[29] Seung-chan Shin,et al. Implementation of the Real-Time People Counting System using Wireless Sensor Networks , 2007 .
[30] Radhika Nagpal,et al. An Algorithm For Group Formation In An Amorphous Computer , 1998 .
[31] Josep Domingo-Ferrer,et al. Query Profile Obfuscation by Means of Optimal Query Exchange between Users , 2012, IEEE Transactions on Dependable and Secure Computing.
[32] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[33] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[34] David C. Parkes,et al. Non-Cooperative Location Privacy , 2013, IEEE Transactions on Dependable and Secure Computing.
[35] Pan Li,et al. n-CD: A geometric approach to preserving location privacy in location-based services , 2013, 2013 Proceedings IEEE INFOCOM.
[36] Tanzima Hashem,et al. Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.
[37] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[38] Jianliang Xu,et al. Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.
[39] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[40] S. Sophia,et al. A Survey of Adaptive Distributed Clustering Algorithms for Wireless Sensor Networks , 2011 .
[41] Panos Kalnis,et al. A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..
[42] Elisa Bertino,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[43] Alexandre M. Bayen,et al. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines , 2012, IEEE Transactions on Mobile Computing.
[44] Urs Hengartner,et al. A distributed k-anonymity protocol for location privacy , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[45] Jiahui Chen,et al. Query-Aware Location Privacy Model Based on p-Sensitive and k-Anonymity for Road Networks , 2012 .
[46] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[47] Marco Gruteser,et al. Privacy-Aware Location Sensor Networks , 2003, HotOS.
[48] Edward J. Coyle,et al. An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).