RemindU: A secure and efficient location based reminder system
暂无分享,去创建一个
[1] Urs Hengartner,et al. Hiding Location Information from Location-Based Services , 2007, 2007 International Conference on Mobile Data Management.
[2] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] Wenke Lee,et al. CHEX: statically vetting Android apps for component hijacking vulnerabilities , 2012, CCS.
[4] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[5] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[6] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[7] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[9] Cyrus Shahabi,et al. Location privacy: going beyond K-anonymity, cloaking and anonymizers , 2011, Knowledge and Information Systems.
[10] Guoliang Xue,et al. Secure cloud-assisted location based reminder , 2013, ASIA CCS '13.
[11] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[12] Jie Wu,et al. The Dynamic Bloom Filters , 2010, IEEE Transactions on Knowledge and Data Engineering.
[13] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[14] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[15] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[16] X. S. Wang,et al. Preserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated , 2007 .
[17] Sasu Tarkoma,et al. Theory and Practice of Bloom Filters for Distributed Systems , 2012, IEEE Communications Surveys & Tutorials.
[18] Jonathan T. Trostle. Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion , 2013, IACR Cryptol. ePrint Arch..
[19] George Danezis,et al. Proceedings of the 2012 ACM conference on Computer and communications security , 2012, CCS 2012.