Enhancing Security and Privacy in Traffic-Monitoring Systems
暂无分享,去创建一个
Hui Xiong | Marco Gruteser | Baik Hoh | Ansaf Alrabady | M. Gruteser | Hui Xiong | Baik Hoh | A. Alrabady
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] B D Greenshields,et al. A study of traffic capacity , 1935 .
[3] Vijayalakshmi Atluri,et al. Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets , 2004, SAC '04.
[4] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[5] Martin A. Ferman,et al. A simulation evaluation of a real-time traffic information system using probe vehicles , 2003, Proceedings of the 2003 IEEE International Conference on Intelligent Transportation Systems.
[6] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[7] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[8] Randall Cayford,et al. OPERATIONAL PARAMETERS AFFECTING THE USE OF ANONYMOUS CELL PHONE TRACKING FOR GENERATING TRAFFIC INFORMATION , 2003 .
[9] Marco Gruteser,et al. On the Anonymity of Periodic Location Samples , 2005, SPC.
[10] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[11] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[12] Domenico Beneventano,et al. Consistency Checking in Complex Object Database Schemata with Integrity Constraints , 1995, DBPL.
[13] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[14] Tetsuhiro Ishizaka,et al. EVALUATION OF PROBE VEHICLE SYSTEM BY USING MICRO SIMULATION MODEL AND COST ANALYSIS , 2005 .
[15] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[16] Thad Starner,et al. Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.