A privacy-preserving personal sensor data ecosystem
暂无分享,去创建一个
[1] Carmela Troncoso,et al. Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.
[2] Douglas C. Engelbart,et al. A research center for augmenting human intellect , 1968, AFIPS Fall Joint Computing Conference.
[3] Luc Bouganim,et al. Secure personal data servers , 2010, Proc. VLDB Endow..
[4] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[5] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[6] L. Cox. Suppression Methodology and Statistical Disclosure Control , 1980 .
[7] Marco Gruteser,et al. USENIX Association , 1992 .
[8] A. Pentland,et al. Life in the network: The coming age of computational social science: Science , 2009 .
[9] Erez Shmueli,et al. openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.
[10] Markus Jakobsson,et al. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking , 2002, USENIX Security Symposium.
[11] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[12] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[13] Sheng Zhong,et al. Anonymity-preserving data collection , 2005, KDD '05.
[14] Fabio Pianesi,et al. Happiness Recognition from Mobile Phone Data , 2013, 2013 International Conference on Social Computing.
[15] Alex Pentland,et al. Building privacy-preserving location-based apps , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[16] N. Eagle,et al. Network Diversity and Economic Development , 2010, Science.
[17] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[18] Alex Pentland,et al. Social fMRI: Investigating and shaping social mechanisms in the real world , 2011, Pervasive Mob. Comput..
[19] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[20] Fuming Shih,et al. Understanding People's Preferences for Disclosing Contextual Information to Smartphone Apps , 2013, HCI.
[21] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[22] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[23] Vannevar Bush,et al. As we may think , 1945, INTR.
[24] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[25] T. Beauchamp,et al. A History and Theory of Informed Consent , 1986, American Political Science Review.
[26] Cecilia Mascolo,et al. An Empirical Study of Geographic User Activity Patterns in Foursquare , 2011, ICWSM.
[27] Alex Pentland,et al. Predicting Spending Behavior Using Socio-mobile Features , 2013, 2013 International Conference on Social Computing.
[28] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[29] Tom Kirkham,et al. A personal data store for an Internet of Subjects , 2011, International Conference on Information Society (i-Society 2011).