Mobile phones as traffic sensors with map matching and privacy considerations
暂无分享,去创建一个
Wisnu Jatmiko | Adi Wibowo | Benny Hardjono | M. Febrian Rachmadi | W. Jatmiko | Benny Hardjono | M. F. Rachmadi | A. Wibowo
[1] ヘイニー,リチャード,ディー.. Location sharing and tracking using mobile phones or other wireless devices , 2006 .
[2] Paulo S. Pagliusi. A Contemporary Foreword on GSM Security , 2002, InfraSec.
[3] Christos Xenakis. Security Measures and Weaknesses of the GPRS Security Architecture , 2008, Int. J. Netw. Secur..
[4] David Bernstein,et al. Some map matching algorithms for personal navigation assistants , 2000 .
[5] Peng Hao,et al. VTL zone-aware path cloaking algorithm , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[6] Hui Xiong,et al. Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking , 2010, IEEE Transactions on Mobile Computing.
[7] Toshio Fukuda,et al. Fuzzy learning vector quantization based on particle swarm optimization for artificial odor dicrimination system , 2009 .
[8] Alexandre M. Bayen,et al. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines , 2012, IEEE Transactions on Mobile Computing.
[9] Siddharth Jain,et al. Engineering location based pathfinding on Indian road networks over low end mobile phones , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).
[10] K. Sekiyama,et al. SELF-ORGANIZING URBAN TRAFFIC CONTROL ARCHITECTURE WITH SWARM-SELF ORGANIZING MAP IN JAKARTA: SIGNAL CONTROL SYSTEM AND SIMULATOR , 2010 .
[11] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[12] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[13] James E. Moore,et al. Use of Los Angeles Freeway Service Patrol Vehicles as Probe Vehicles , 2001 .
[14] Alexandre M. Bayen,et al. Evaluation of traffic data obtained via GPS-enabled mobile phones: The Mobile Century field experiment , 2009 .
[15] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, CRYPTO.
[16] Ramesh Govindan,et al. Energy-efficient positioning for smartphones using Cell-ID sequence matching , 2011, MobiSys '11.
[17] G. Lachapelle,et al. Phase coherency of CDMA caller location processing based on TCXO frequency reference with intermittent GPS correction , 2005 .
[18] L. Bharathi. Security Enhancement Using Mutual Authentication in Existing CDMA Systems , 2010 .
[19] Guillaume Leduc,et al. Road Traffic Data: Collection Methods and Applications , 2008 .
[20] Sing Yiu Cheung,et al. Traffic Surveillance by Wireless Sensor Networks: Final Report , 2007 .
[21] Alexandre M. Bayen,et al. Virtual trip lines for distributed privacy-preserving traffic monitoring , 2008, MobiSys '08.
[22] Joongheon Kim,et al. Energy-efficient rate-adaptive GPS-based positioning for smartphones , 2010, MobiSys '10.
[23] J. Quirke. Security in the GSM system , 2004 .
[24] D. Mohapatra,et al. Survey of location based wireless services , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[25] M. Decker,et al. Location Privacy-An Overview , 2008, 2008 7th International Conference on Mobile Business.
[26] M. Anwar Ma'sum,et al. Enhanced adaptive traffic signal control system using camera sensor and embedded system , 2011, 2011 International Symposium on Micro-NanoMechatronics and Human Science.
[27] Robert B. Noland,et al. Current map-matching algorithms for transport applications: State-of-the art and future research directions , 2007 .
[28] Dae Hyun Ryu,et al. A Security Weakness of the CDMA(Code Division Multiple Access) Cellular Service , 2006 .
[29] R. Bertini,et al. Transit Buses as Traffic Probes: Use of Geolocation Data for Empirical Evaluation , 2004 .
[30] D. Schrank,et al. 2001 Urban Mobility Report , 2001 .
[31] Washington Y. Ochieng,et al. Integrity of map-matching algorithms , 2006 .