Enhancing privacy in collaborative traffic-monitoring systems using autonomous location update
暂无分享,去创建一个
[1] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[2] Florian Dötzer,et al. Privacy Issues in Vehicular Ad Hoc Networks , 2005, Privacy Enhancing Technologies.
[3] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[4] Panagiotis Papadimitratos,et al. Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.
[5] Alexandre M. Bayen,et al. Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.
[6] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[7] Thomas Brinkhoff,et al. A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.
[8] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[9] Victor C. M. Leung,et al. Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks , 2010, Mob. Networks Appl..
[10] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[11] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[12] Yücel Saygin,et al. CoRPPS: Collusion Resistant Pseudonym Providing System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[13] Lee A. Vierling,et al. Effects of habitat on GPS collar performance: using data screening to reduce location error , 2007 .
[14] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[15] Emre Kaplan,et al. Discovering private trajectories using background information , 2010, Data Knowl. Eng..
[16] Yan Huang,et al. Cloaking locations for anonymous location based services: a hybrid approach , 2009, GeoInformatica.
[17] Troels B. Sørensen,et al. In-Band Interference Effects on UTRA LTE Uplink Resource Block Allocation , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[18] A. Prasad Sistla,et al. Modeling and querying moving objects , 1997, Proceedings 13th International Conference on Data Engineering.
[19] Hui Xiong,et al. Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.
[20] Jianliang Xu,et al. PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects , 2010, IEEE Transactions on Knowledge and Data Engineering.