Privacy Enhancing Technologies for Ridesharing

[1]  Irene Casas,et al.  Protection of Geoprivacy and Accuracy of Spatial Information: How Effective Are Geographical Masks? , 2004, Cartogr. Int. J. Geogr. Inf. Geovisualization.

[2]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[3]  Sushil Jajodia,et al.  Anonymity and Historical-Anonymity in Location-Based Services , 2009, Privacy in Location-Based Applications.

[4]  Fernando Ordóñez,et al.  Ridesharing: The state-of-the-art and future directions , 2013 .

[5]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[6]  T F Golob,et al.  THE EFFECTIVENESS OF RIDESHARING INCENTIVES: DISCRETE-CHOICE MODELS OF COMMUTING IN SOUTHERN CALIFORNIA. REVISED EDITION , 1991 .

[7]  Madhav V. Marathe,et al.  Formal-Language-Constrained Path Problems , 1997, SIAM J. Comput..

[8]  Sébastien Gambs,et al.  De-anonymization attack on geolocated data , 2014, J. Comput. Syst. Sci..

[9]  Marie-José Huguet,et al.  Carpooling: the 2 Synchronization Points Shortest Paths Problem , 2013, ATMOS.

[10]  Weisong Shi,et al.  Privacy preserving shortest path routing with an application to navigation , 2014, Pervasive Mob. Comput..

[11]  Ling Liu,et al.  MobiEyes: A Distributed Location Monitoring Service Using Moving Location Queries , 2006, IEEE Transactions on Mobile Computing.

[12]  Sébastien Gambs,et al.  Show me how you move and I will tell you who you are , 2010, SPRINGL '10.

[13]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[14]  G. Rushton,et al.  Geographically masking health data to preserve confidentiality. , 1999, Statistics in medicine.

[15]  Caitlin D Cottrill,et al.  Approaches to Privacy Preservation in Intelligent Transportation Systems and Vehicle–Infrastructure Integration Initiative , 2009 .

[16]  Marie-José Huguet,et al.  Meeting points in ridesharing: A privacy-preserving approach , 2016, Transportation Research Part C: Emerging Technologies.

[17]  Tancrède Lepoint,et al.  NFLlib: NTT-Based Fast Lattice Library , 2016, CT-RSA.

[18]  Claude Castelluccia,et al.  Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[19]  J. Garvill,et al.  Effects of values, problem awareness, and personal norm on willingness to reduce personal car use , 2003 .

[20]  Benjamin C. M. Fung,et al.  Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..

[21]  Levente Buttyán,et al.  On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs , 2007, ESAS.

[22]  Jean-Pierre Hubaux,et al.  Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices , 2014, IEEE Transactions on Information Forensics and Security.

[23]  John Turek,et al.  Challenges in Flexible Aggregation of Pervasive Data , 2001 .

[24]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[25]  Maxim Raya,et al.  Mix-Zones for Location Privacy in Vehicular Networks , 2007 .

[26]  Yu Zhang,et al.  Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.

[27]  C. Morency The ambivalence of ridesharing , 2007 .