Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems
暂无分享,去创建一个
Panagiotis Papadimitratos | Thanassis Giannetsos | Stylianos Gisdakis | Panos Papadimitratos | S. Gisdakis | Thanassis Giannetsos
[1] Pablo Rodriguez,et al. On economic heavy hitters: shapley value analysis of 95th-percentile pricing , 2010, IMC '10.
[2] Chen-Khong Tham,et al. Fairness and social welfare in incentivizing participatory sensing , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[3] Claudio Soriente,et al. Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI) , 2013, IEEE Transactions on Information Forensics and Security.
[4] Delphine Christin,et al. Privacy in mobile participatory sensing , 2016 .
[5] Panagiotis Papadimitratos,et al. SPPEAR: security & privacy-preserving architecture for participatory-sensing applications , 2014, WiSec '14.
[6] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[7] Neeli R. Prasad,et al. People-centric sensing in assistive healthcare: Privacy challenges and directions , 2011, Secur. Commun. Networks.
[8] Panagiotis Papadimitratos,et al. Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).
[9] Boleslaw K. Szymanski,et al. Socially-aware market mechanism for participatory sensing , 2012, MiSeNet '12.
[10] Panagiotis Papadimitratos,et al. Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.
[11] Apu Kapadia,et al. Opportunistic sensing: Security challenges for the new paradigm , 2009, 2009 First International Communication Systems and Networks and Workshops.
[12] H. T. Mouftah,et al. Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things , 2014, IEEE Internet of Things Journal.
[13] Zhu Han,et al. Incentive mechanism for collaborative smartphone sensing using overlapping coalition formation games , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[14] Wei Cheng,et al. ARTSense: Anonymous reputation and trust in participatory sensing , 2013, 2013 Proceedings IEEE INFOCOM.
[15] Marco Fiore,et al. Large-scale urban vehicular mobility for networking research , 2011, 2011 IEEE Vehicular Networking Conference (VNC).
[16] Panagiotis Papadimitratos,et al. SHIELD: a data verification framework for participatory sensing systems , 2015, WISEC.
[17] Panagiotis Papadimitratos,et al. SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.
[18] Sivan Toledo,et al. VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.
[19] Tal Malkin,et al. Reputation Systems for Anonymous Networks , 2008, Privacy Enhancing Technologies.
[20] Bruno Blanchet,et al. Automatic proof of strong secrecy for security protocols , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[21] Jan Camenisch,et al. Group Signatures: Better Efficiency and New Theoretical Aspects , 2004, SCN.
[22] Felix C. Freiling,et al. Location privacy in urban sensing networks: research challenges and directions [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[23] Jianfeng Ma,et al. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.
[24] Roger Wattenhofer,et al. Ikarus: large-scale participatory sensing at high altitudes , 2011, HotMobile '11.
[25] Miguel A. Labrador,et al. P-Sense: A participatory sensing system for air pollution monitoring and control , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[26] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[27] Chi-Yin Chow,et al. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.
[28] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[29] Cyrus Shahabi,et al. TAPAS: Trustworthy privacy-aware participatory sensing , 2012, Knowledge and Information Systems.
[30] Bin Guo,et al. From participatory sensing to Mobile Crowd Sensing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[31] Naixue Xiong,et al. Anonymity-Based Privacy-Preserving Data Reporting for Participatory Sensing , 2015, IEEE Internet of Things Journal.
[32] Lei Chen,et al. Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[33] Minho Shin,et al. AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..
[34] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[35] Deborah Estrin,et al. Examining micro-payments for participatory sensing data collections , 2010, UbiComp.
[36] Vana Kalogeraki,et al. Privacy preservation for participatory sensing data , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[37] Diogo R. Ferreira,et al. Context Inference for Mobile Applications in the UPCASE Project , 2009, MOBILWARE.
[38] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[39] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[40] Delphine Reinhardt. Privacy in mobile participatory sensing: Current trends and future challenges , 2016, J. Syst. Softw..
[41] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.
[42] Salil S. Kanhere,et al. IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[43] Tassos Dimitriou,et al. PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing , 2012, MobiSec.
[44] Andrew Raij,et al. A Survey of Incentive Techniques for Mobile Crowd Sensing , 2015, IEEE Internet of Things Journal.
[45] Ioannis Krontiris,et al. Monetary incentives in participatory sensing using multi-attributive auctions , 2012, Int. J. Parallel Emergent Distributed Syst..
[46] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[47] Neil A. M. Maiden. Monitoring Our Requirements , 2013, IEEE Software.
[48] Salil S. Kanhere,et al. A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..
[49] Baik Hoh,et al. Dynamic pricing incentive for participatory sensing , 2010, Pervasive Mob. Comput..
[50] Jyrki Wallenius,et al. European Journal of Operational Research Multi-attribute Online Reverse Auctions: Recent Research Trends , 2022 .
[51] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[52] Tarek F. Abdelzaher,et al. PoolView: stream privacy for grassroots participatory sensing , 2008, SenSys '08.
[53] Meng-Chieh Chiu,et al. Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing , 2013, MobiSys '13.
[54] Iordanis Koutsopoulos,et al. Optimal incentive-driven design of participatory sensing systems , 2013, 2013 Proceedings IEEE INFOCOM.
[55] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[56] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[57] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[58] Ramachandran Ramjee,et al. PRISM: platform for remote sensing using smartphones , 2010, MobiSys '10.