A collaborative k-anonymity approach for location privacy in location-based services
暂无分享,去创建一个
[1] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[2] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[3] Claudio Bettini,et al. Protecting Users' Anonymity in Pervasive Computing Environments , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[4] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[5] Aziz Mohaisen,et al. Privacy in Location Based Services: Primitives Toward the Solution , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[6] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[7] M. Worboys,et al. A formal approach to imperfection in geographic information , 2001 .
[8] Urs Hengartner. Location privacy based on trusted computing and secure logging , 2008, SecureComm.
[9] Ling Liu,et al. A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .
[10] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[11] Marco Gruteser,et al. USENIX Association , 1992 .
[12] Agusti Solanas,et al. A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..
[13] Urs Hengartner,et al. A distributed k-anonymity protocol for location privacy , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[14] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[15] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[16] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[17] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[18] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[19] Josep Domingo-Ferrer,et al. Location Privacy in Location-Based Services: Beyond TTP-based Schemes , 2008, PiLBA.
[20] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[21] M.O. Gheorghita,et al. Location Privacy in Chain-Based Protocols for Location-Based Services , 2008, 2008 The Third International Conference on Digital Telecommunications (icdt 2008).
[22] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[23] Josep Domingo-Ferrer,et al. Microaggregation for Database and Location Privacy , 2006, NGITS.
[24] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[25] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[26] Agusti Solanas,et al. Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.