A context-aware scheme for privacy-preserving location-based services
暂无分享,去创建一个
Xinwen Fu | Wei Yu | Wei Zhao | Nan Zhang | Aniket Pingley | Nan Zhang | Wei Yu | Xinwen Fu | Wei Zhao | Aniket Pingley
[1] Marco Gruteser,et al. USENIX Association , 1992 .
[2] Marco Gruteser,et al. Location Privacy in Wireless Networks , 2011, Encyclopedia of Cryptography and Security.
[3] Xinwen Fu,et al. On performance bottleneck of anonymous communication networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[4] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[5] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[6] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[7] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[9] Panos Kalnis,et al. Outsourcing Search Services on Private Spatial Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[10] Dimitrios Gunopulos,et al. Anytime Measures for Top-k Algorithms , 2007, VLDB.
[11] Walid G. Aref,et al. Analysis of Multi-Dimensional Space-Filling Curves , 2003, GeoInformatica.
[12] Per Enge,et al. Special Issue on Global Positioning System , 1999, Proc. IEEE.
[13] Torben Bach Pedersen,et al. Privacy-Preserving Data Mining on Moving Object Trajectories , 2007, 2007 International Conference on Mobile Data Management.
[14] Mohamed Mokbel,et al. Challenges in Preserving Location Privacy in Peer-to-Peer Environments , 2006, 2006 Seventh International Conference on Web-Age Information Management Workshops.
[15] Heinz-Otto Peitgen,et al. The science of fractal images , 2011 .
[16] Nikita Borisov,et al. A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.
[17] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[18] Christos Faloutsos,et al. Analysis of the Clustering Properties of the Hilbert Space-Filling Curve , 2001, IEEE Trans. Knowl. Data Eng..
[19] Desh Ranjan,et al. Space-Filling Curves and Their Use in the Design of Geometric Data Structures , 1997, Theor. Comput. Sci..
[20] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[21] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[22] Jon Louis Bentley,et al. K-d trees for semidynamic point sets , 1990, SCG '90.
[23] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[24] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[25] Einar Snekkenes,et al. Concepts for personal location privacy policies , 2001, EC '01.
[26] Ling Liu,et al. A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .
[27] Beng Chin Ooi,et al. iDistance: An adaptive B+-tree based indexing method for nearest neighbor search , 2005, TODS.
[28] Andy Hopper,et al. The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.
[29] Christos Faloutsos,et al. Fractals for secondary key retrieval , 1989, PODS.
[30] B. R. Badrinath,et al. VOR base stations for indoor 802.11 positioning , 2004, MobiCom '04.
[31] Wei Zhao,et al. Privacy-Preserving Data Mining Systems , 2007, Computer.
[32] Kay Römer. The Lighthouse Location System for Smart Dust , 2003, MobiSys '03.
[33] Bernhard Plattner,et al. Analysis of an anonymity network for web browsing , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[34] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[35] Dirk Grunwald,et al. Shining Light in Dark Places: A Study of Anonymous Network Usage ; CU-CS-1032-07 , 2007 .
[36] Radu Sion,et al. On the Practicality of Private Information Retrieval , 2007, NDSS.
[37] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[38] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[39] Weibo Gong,et al. Application level relay for high-bandwidth data transport , 2004 .
[40] Julian L. Simon,et al. The Effect of Population Density on Infrastructure: The Case of Road Building , 1975, Economic Development and Cultural Change.
[41] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[42] Jon Louis Bentley,et al. An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.