Privacy Enhancing Technologies for Ridesharing
暂无分享,去创建一个
[1] Irene Casas,et al. Protection of Geoprivacy and Accuracy of Spatial Information: How Effective Are Geographical Masks? , 2004, Cartogr. Int. J. Geogr. Inf. Geovisualization.
[2] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[3] Sushil Jajodia,et al. Anonymity and Historical-Anonymity in Location-Based Services , 2009, Privacy in Location-Based Applications.
[4] Fernando Ordóñez,et al. Ridesharing: The state-of-the-art and future directions , 2013 .
[5] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[6] T F Golob,et al. THE EFFECTIVENESS OF RIDESHARING INCENTIVES: DISCRETE-CHOICE MODELS OF COMMUTING IN SOUTHERN CALIFORNIA. REVISED EDITION , 1991 .
[7] Madhav V. Marathe,et al. Formal-Language-Constrained Path Problems , 1997, SIAM J. Comput..
[8] Sébastien Gambs,et al. De-anonymization attack on geolocated data , 2014, J. Comput. Syst. Sci..
[9] Marie-José Huguet,et al. Carpooling: the 2 Synchronization Points Shortest Paths Problem , 2013, ATMOS.
[10] Weisong Shi,et al. Privacy preserving shortest path routing with an application to navigation , 2014, Pervasive Mob. Comput..
[11] Ling Liu,et al. MobiEyes: A Distributed Location Monitoring Service Using Moving Location Queries , 2006, IEEE Transactions on Mobile Computing.
[12] Sébastien Gambs,et al. Show me how you move and I will tell you who you are , 2010, SPRINGL '10.
[13] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] G. Rushton,et al. Geographically masking health data to preserve confidentiality. , 1999, Statistics in medicine.
[15] Caitlin D Cottrill,et al. Approaches to Privacy Preservation in Intelligent Transportation Systems and Vehicle–Infrastructure Integration Initiative , 2009 .
[16] Marie-José Huguet,et al. Meeting points in ridesharing: A privacy-preserving approach , 2016, Transportation Research Part C: Emerging Technologies.
[17] Tancrède Lepoint,et al. NFLlib: NTT-Based Fast Lattice Library , 2016, CT-RSA.
[18] Claude Castelluccia,et al. Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[19] J. Garvill,et al. Effects of values, problem awareness, and personal norm on willingness to reduce personal car use , 2003 .
[20] Benjamin C. M. Fung,et al. Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..
[21] Levente Buttyán,et al. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.
[22] Jean-Pierre Hubaux,et al. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices , 2014, IEEE Transactions on Information Forensics and Security.
[23] John Turek,et al. Challenges in Flexible Aggregation of Pervasive Data , 2001 .
[24] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[25] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[26] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[27] C. Morency. The ambivalence of ridesharing , 2007 .