Multidimensional privacy preservation in location-based services
暂无分享,去创建一个
Tao Peng | Qin Liu | Guojun Wang | Yang Xiang | Shuhong Chen | Tao Peng | Guojun Wang | Qin Liu | Shuhong Chen | Yang Xiang
[1] Ren-Hung Hwang,et al. A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.
[2] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Indrajit Ray,et al. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[5] Jun Zhang,et al. Detecting and Preventing Cyber Insider Threats: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[6] Gang Sun,et al. L2P2: A location-label based approach for privacy preserving in LBS , 2017, Future Gener. Comput. Syst..
[7] Imran Memon,et al. Search me if you can: Multiple mix zones with location privacy protection for mapping services , 2017, Int. J. Commun. Syst..
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[10] Ibrahim Kamel,et al. Dynamic spatial index for efficient query processing on the cloud , 2017, Journal of Cloud Computing.
[11] D. Hilbert. Ueber die stetige Abbildung einer Line auf ein Flächenstück , 1891 .
[12] Md Zakirul Alam Bhuiyan,et al. A Dual Privacy Preserving Scheme in Continuous Location-Based Services , 2018, IEEE Internet of Things Journal.
[13] Rong Zheng,et al. Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[14] Günther F. Schrack,et al. Encoding and decoding the Hilbert order , 1996 .
[15] Cyrus Shahabi,et al. Differentially Private Location Protection for Worker Datasets in Spatial Crowdsourcing , 2017, IEEE Transactions on Mobile Computing.
[16] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[17] Elisa Bertino,et al. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.
[18] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[19] Carmela Troncoso,et al. Privacy Games Along Location Traces , 2016, ACM Trans. Priv. Secur..
[20] Yi Mu,et al. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications , 2016, IEEE Transactions on Information Forensics and Security.
[21] Tao Peng,et al. Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..
[22] Elisa Bertino,et al. Privacy-Preserving and Content-Protecting Location Based Queries , 2014, IEEE Trans. Knowl. Data Eng..
[23] Jiannong Cao,et al. Optimal Resource Allocation for Reliable and Energy Efficient Cooperative Communications , 2013, IEEE Transactions on Wireless Communications.
[24] Jie Wu,et al. Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.
[25] Frank Dürr,et al. A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.
[26] Yuguang Fang,et al. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing , 2018, IEEE Transactions on Emerging Topics in Computing.
[27] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[28] Nasser Ghadiri,et al. $P^4QS$: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications , 2016, IEEE Transactions on Vehicular Technology.
[29] Jie Wu,et al. Dynamic access policy in cloud-based personal health record (PHR) systems , 2017, Inf. Sci..
[30] Tao Peng,et al. Privacy Preserving Scheme for Location and Content Protection in Location-Based Services , 2016, SpaCCS.
[31] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[32] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[33] Tao Peng,et al. Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.
[34] Jianfeng Ma,et al. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.
[35] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[36] Jie Wu,et al. Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..
[37] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[38] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[39] Cheng Huang,et al. An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud , 2016, IEEE Transactions on Vehicular Technology.
[40] D. T. Lee,et al. On k-Nearest Neighbor Voronoi Diagrams in the Plane , 1982, IEEE Transactions on Computers.
[41] Jemal H. Abawajy,et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..