Location privacy-protection based on p-destination in mobile social networks: A game theory analysis
暂无分享,去创建一个
[1] Ehud D. Karnin,et al. A Parallel Algorithm for the Knapsack Problem , 1984, IEEE Transactions on Computers.
[2] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[3] Ezzatollah Salari,et al. A novel Multiple Hypothesis Testing (MHT) scheme for tracking of dim objects , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).
[4] Ren-Hung Hwang,et al. SocialCloaking: A distributed architecture for K-anonymity location privacy protection , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[5] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[6] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[7] Milena Radenkovic,et al. The quest for location-privacy in opportunistic mobile social networks , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[8] Jianliang Xu,et al. p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.
[9] Karim Emara,et al. Vehicle tracking using vehicular network beacons , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[10] Chunlei Liu,et al. Query-Aware Anonymization in Location-Based Service , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[11] Jianliang Xu,et al. Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2008, IEEE Transactions on Knowledge and Data Engineering.
[12] Indrajit Ray,et al. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[13] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[14] Marco Gruteser,et al. USENIX Association , 1992 .
[15] Sushil Jajodia,et al. Preserving Anonymity of Recurrent Location-Based Queries , 2009, 2009 16th International Symposium on Temporal Representation and Reasoning.
[16] Dimitrios Makrakis,et al. Protecting Location Privacy with Clustering Anonymization in vehicular networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[17] Xiaohui Liang,et al. Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.
[18] Kyriakos Mouratidis,et al. Anonymous Query Processing in Road Networks , 2010, IEEE Transactions on Knowledge and Data Engineering.
[19] Xiaodong Lin,et al. PLAM: A privacy-preserving framework for local-area mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[20] Kien A. Hua,et al. Query l-diversity in Location-Based Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[21] Jae-Woo Chang,et al. A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[22] Liang Ye,et al. MP2P Based on Social Model to Serve for LBS , 2010, 2010 International Conference on E-Business and E-Government.
[23] Yuguang Fang,et al. A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.