On location privacy and quality of information in participatory sensing
暂无分享,去创建一个
[1] Mark H. Hansen,et al. Participatory sensing - eScholarship , 2006 .
[2] Marco Gruteser,et al. Privacy-Aware Location Sensor Networks , 2003, HotOS.
[3] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[4] Reza Shokri,et al. A distortion-based metric for location privacy , 2009, WPES '09.
[5] Grigorios Loukides,et al. Data utility and privacy protection trade-off in k-anonymisation , 2008, PAIS '08.
[6] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] Roy H. Campbell,et al. Routing through the mist: privacy preserving communication in ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[8] Ninghui Li,et al. On the tradeoff between privacy and utility in data publishing , 2009, KDD.
[9] Chatschik Bisdikian,et al. On Sensor Sampling and Quality of Information: A Starting Point , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[10] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[11] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[12] Carmela Troncoso,et al. Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.
[13] Tien Pham,et al. QoI-based resource allocation for multi-target tracking in energy constrained sensor networks , 2011, 14th International Conference on Information Fusion.
[14] Kin K. Leung,et al. QoI-Aware Wireless Sensor Network Management for Dynamic Multi-Task Operations , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[15] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[16] Alun D. Preece,et al. Quality views: capturing and exploiting the user perspective on data quality , 2006, VLDB.
[17] Wen Hu,et al. Ear-phone: an end-to-end participatory urban noise mapping system , 2010, IPSN '10.
[18] Nicholas R. Jennings,et al. Decentralized control of adaptive sampling in wireless sensor networks , 2009, TOSN.
[19] Waylon Brunette,et al. Data MULEs: modeling a three-tier architecture for sparse sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[20] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[21] Marco Gruteser,et al. USENIX Association , 1992 .
[22] Dan Suciu,et al. The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.
[23] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[24] E. Paulos,et al. Sensing Atmosphere , 2007 .
[25] Edith C. H. Ngai,et al. On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.
[26] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.