GeoSecure: Towards secure outsourcing of GPS data over cloud
暂无分享,去创建一个
[1] Francesca Pratesi,et al. Privacy-by-design in big data analytics and social mining , 2014, EPJ Data Science.
[2] Pradeep K. Atrey,et al. Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System , 2017, ACM Trans. Multim. Comput. Commun. Appl..
[3] Cong Sun,et al. Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..
[4] S. S. Ravi,et al. SQUISH: an online approach for GPS trajectory compression , 2011, COM.Geo.
[5] Piotr Jankowski,et al. Privacy and spatial pattern preservation in masked GPS trajectory data , 2016, Int. J. Geogr. Inf. Sci..
[6] Timos K. Sellis,et al. Sampling Trajectory Streams with Spatiotemporal Criteria , 2006, 18th International Conference on Scientific and Statistical Database Management (SSDBM'06).
[7] Springer-Verlag London. A differentially private algorithm for location data release , 2015 .
[8] S. S. Ravi,et al. Compression of trajectory data: a comprehensive evaluation and new approach , 2014, GeoInformatica.
[9] Roberto Di Pietro,et al. Track me if you can: Transparent obfuscation for Location based Services , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[10] Limin Jia,et al. Compression Algorithm of Road Traffic Spatial Data Based on LZW Encoding , 2017 .
[11] Yu Zheng,et al. Trajectory Data Mining , 2015, ACM Trans. Intell. Syst. Technol..
[12] Chengqi Zhang,et al. Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data , 2017, EDBT.
[13] Zhen He,et al. Trajic: An Effective Compression System for Trajectory Data , 2015, IEEE Transactions on Knowledge and Data Engineering.
[14] David H. Douglas,et al. ALGORITHMS FOR THE REDUCTION OF THE NUMBER OF POINTS REQUIRED TO REPRESENT A DIGITIZED LINE OR ITS CARICATURE , 1973 .
[15] Xing Xie,et al. Mining interesting locations and travel sequences from GPS trajectories , 2009, WWW '09.
[16] Roger W. Sinnott,et al. Astronomical computing: 1. Computing under the open sky. 2. Virtues of the haversine. , 1984 .
[17] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[18] Lu Li,et al. Efficient secure similarity computation on encrypted trajectory data , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[19] Samuel Madden,et al. TrajStore: An adaptive storage system for very large trajectory data sets , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[20] Manoj Misra,et al. A secure image sharing scheme based on SVD and Fractional Fourier Transform , 2017, Signal Process. Image Commun..
[21] Hui Xiong,et al. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.
[22] Balasubramanian Raman,et al. Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud , 2017 .
[23] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[24] R. Nigel Horspool. Improving LZW (data compression algorithm) , 1991, [1991] Proceedings. Data Compression Conference.
[25] Xing Xie,et al. GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory , 2010, IEEE Data Eng. Bull..