A privacy-preserving location tracking system for smartphones based on cloud storage
暂无分享,去创建一个
Hai Jin | Deqing Zou | Weiqi Dai | Yang Xiang | Kao Zhao
[1] David C. Parkes,et al. On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.
[2] Romit Roy Choudhury,et al. Micro-Blog: sharing and querying content through mobile phones and social participation , 2008, MobiSys '08.
[3] John Seely Brown,et al. The Origins of Ubiquitous Computing Research at PARC in the Late 1980s , 1999, IBM Syst. J..
[4] Steve Talbott. The trouble with ubiquitous technology pushers , 2000, CFP '00.
[5] Hari Balakrishnan,et al. Accurate, Low-Energy Trajectory Mapping for Mobile Devices , 2011, NSDI.
[6] Richard Harper. Why do People Wear Active Badges , 1993 .
[7] Mikkel Baun Kjærgaard,et al. Energy-efficient trajectory tracking for mobile devices , 2011, MobiSys '11.
[8] Tadayoshi Kohno,et al. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs , 2008, USENIX Security Symposium.
[9] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[10] Byung K. Yi,et al. Location Based Services for Mobiles :Technologies and Standards , 2008 .
[11] Srdjan Capkun,et al. Location privacy of distance bounding protocols , 2008, CCS.
[12] Hui Xiong,et al. Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.
[13] Michael Becher,et al. Security of smartphones at the dawn of their ubiquitousness , 2009 .