SSPA-LBS: Scalable and Social-Friendly Privacy-Aware Location-Based Services
暂无分享,去创建一个
[1] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[2] Marijke De Soete. Attribute Certificate , 2011, Encyclopedia of Cryptography and Security.
[3] Philippe Golle,et al. On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.
[4] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Agusti Solanas,et al. Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.
[6] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[7] Xing Xie,et al. User-Service Rating Prediction by Exploring Social Users' Rating Behaviors , 2016, IEEE Transactions on Multimedia.
[8] Rinku Dewri,et al. Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers , 2013, IEEE Transactions on Mobile Computing.
[9] Nitesh Saxena,et al. Cover locations: availing location-based services without revealing the location , 2011, WPES '11.
[10] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[11] Igor Bisio,et al. GPS/HPS-and Wi-Fi Fingerprint-Based Location Recognition for Check-In Applications Over Smartphones in Cloud-Based LBSs , 2013, IEEE Transactions on Multimedia.
[12] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[13] Luming Zhang,et al. Fusion of Magnetic and Visual Sensors for Indoor Localization: Infrastructure-Free and More Effective , 2017, IEEE Transactions on Multimedia.
[14] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[15] Tetsuji Satoh,et al. Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[16] Agusti Solanas,et al. A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..
[17] Ying Cai,et al. Feeling-based location privacy protection for location-based services , 2009, CCS.
[18] Ueli Maurer,et al. Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1994, CRYPTO.
[19] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[20] Xiangyu Wang,et al. Semantic-Based Location Recommendation With Multimodal Venue Semantics , 2015, IEEE Transactions on Multimedia.
[21] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[22] Ja-Ling Wu,et al. A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search , 2013, IEEE Transactions on Information Forensics and Security.
[23] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[24] Chang Wen Chen,et al. Attribute-based multi-dimension scalable access control for social media sharing , 2016, 2016 IEEE International Conference on Multimedia and Expo (ICME).
[25] Hui Zang,et al. Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.
[26] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[27] Chang Wen Chen,et al. Nearby Friend Discovery with Geo-indistinguishability to Stalkers , 2014, FNC/MobiSPC.
[28] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[29] Catuscia Palamidessi,et al. Optimal Geo-Indistinguishable Mechanisms for Location Privacy , 2014, CCS.
[30] Panos Kalnis,et al. Providing K-Anonymity in location based services , 2010, SKDD.