An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
暂无分享,去创建一个
Hai Liu | Jianfeng Ma | Kuan-Ching Li | Meixia Miao | Xinghua Li | Kuan-Ching Li | Jianfeng Ma | Xinghua Li | Meixia Miao | Hai Liu
[1] M. A. Ansari,et al. A Survey: Soft Computing in Intelligent Information Retrieval Systems , 2012, 2012 12th International Conference on Computational Science and Its Applications.
[2] Reza Shokri,et al. On the Optimal Placement of Mix Zones , 2009, Privacy Enhancing Technologies.
[3] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[4] Elisa Bertino,et al. Privacy-Preserving and Content-Protecting Location Based Queries , 2014, IEEE Trans. Knowl. Data Eng..
[5] P. B. Metre,et al. Survey of soft computing techniques for joint radio resource management , 2012, 2012 International Conference on Multimedia Computing and Systems.
[6] Xi Fang,et al. Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.
[7] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[8] Minyi Guo,et al. Long-term location privacy protection for location-based services in mobile cloud computing , 2016, Soft Comput..
[9] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[10] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[11] Kevin Leyton-Brown,et al. Incentives for sharing in peer-to-peer networks , 2001, EC '01.
[12] Ja-Ling Wu,et al. A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search , 2013, IEEE Transactions on Information Forensics and Security.
[13] Antonio F. Gómez-Skarmeta,et al. A soft computing based location-aware access control for smart buildings , 2014, Soft Comput..
[14] Tanja Lange,et al. High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.
[15] Elisa Bertino,et al. Privacy-Preserving and Content-Protecting Location Based Queries , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[16] Jianliang Xu,et al. VERDICT: Privacy-preserving authentication of range queries in location-based services , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[17] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[18] Marco Gruteser,et al. USENIX Association , 1992 .
[19] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[20] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[21] Francesco Palmieri,et al. Hybrid indoor and outdoor location services for new generation mobile terminals , 2014, Personal and Ubiquitous Computing.
[22] José M. Alonso,et al. A multiclassifier approach for topology-based WiFi indoor localization , 2013, Soft Computing.
[23] Nick Koudas,et al. The design of a query monitoring system , 2009, TODS.
[24] Bobby Bhattacharjee,et al. Bittorrent is an auction: analyzing and improving bittorrent's incentives , 2008, SIGCOMM '08.