Privacy Enhancing Technologies
暂无分享,去创建一个
[1] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[2] Felipe Saint-Jean. Java Implementation of a Single-Database Computationally Symmetric Private Information Retrieval (cSPIR) Protocol , 2005 .
[3] Xinwen Fu,et al. CAP: A Context-Aware Privacy Protection System for Location-Based Services , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[4] A. Khoshgozaran,et al. SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.
[5] Ian Goldberg,et al. Achieving Efficient Query Privacy for Location Based Services , 2010, Privacy Enhancing Technologies.
[6] Urs Hengartner,et al. Hiding Location Information from Location-Based Services , 2007, 2007 International Conference on Mobile Data Management.
[7] Elisa Bertino,et al. A Hybrid Technique for Private Location-Based Queries with Database Protection , 2009, SSTD.
[8] Palash Sarkar,et al. Symmetrically Private Information Retrieval (Extended Abstract) , 2000 .
[9] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[10] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[11] Gabriel Ghinita. Understanding the privacy-efficiency trade-off in location based queries , 2008, SPRINGL '08.
[12] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[13] Amos Beimel,et al. Robust Information-Theoretic Private Information Retrieval , 2002, SCN.
[14] Steve Kopp,et al. Understanding Map Projections , 2001 .
[15] Ying Cai,et al. Location anonymity in continuous location-based services , 2007, GIS.
[16] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[17] Sean W. Smith,et al. Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.
[18] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[19] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[20] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[21] Elisa Bertino,et al. Position transformation: a location privacy protection method for moving objects , 2008, SPRINGL '08.
[22] Sushil Jajodia,et al. Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008 , 2008, PiLBA.
[23] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[24] Marco Gruteser,et al. USENIX Association , 1992 .
[25] Ian Goldberg,et al. Improving the Robustness of Private Information Retrieval , 2007 .
[26] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[27] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[28] Dawn Xiaodong Song,et al. Practical forward secure group signature schemes , 2001, CCS '01.
[29] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.