Location privacy and location-aware computing

[1]  Jon Peterson,et al.  A Presence-based GEOPRIV Location Object Format , 2005, RFC.

[2]  Lars Kulik,et al.  Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.

[3]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[4]  James M. Rehg,et al.  Using Sound Source Localization in a Home Environment , 2005, Pervasive.

[5]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[6]  James Scott,et al.  Audio Location: Accurate Low-Cost Location Sensing , 2005, Pervasive.

[7]  Andreas Heinemann,et al.  Survey on Location Privacy in Pervasive Computing , 2005 .

[8]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[9]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[10]  Carl A. Gunter,et al.  A Formal Privacy System and Its Application to Location Based Services , 2004, Privacy Enhancing Technologies.

[11]  Mark Strassman,et al.  Case study: Development of the Find Friend Application , 2004 .

[12]  Michael F. Worboys,et al.  GIS : a computing perspective , 2004 .

[13]  Marco Gruteser,et al.  Wireless Location Privacy Protection , 2003, Computer.

[14]  Marco Gruteser,et al.  USENIX Association , 1992 .

[15]  Telecommunications Board,et al.  IT Roadmap to a Geospatial Future , 2003 .

[16]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[17]  Richard Beckwith,et al.  Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..

[18]  Dieter Hutter,et al.  Security and Privacy in Pervasive Computing State of the Art and Future Directions , 2003, SPC.

[19]  Marco Gruteser,et al.  A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.

[20]  Anind K. Dey,et al.  Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.

[21]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[22]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[23]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[24]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[25]  Marco Gruteser,et al.  Framework for security and privacy in automotive telematics , 2002, WMC '02.

[26]  Allison Kealy,et al.  An Intelligent Navigation Solution for Land Mobile Location-Based Services , 2002, Journal of Navigation.

[27]  Tom Rodden,et al.  A lightweight approach to managing privacy in location-based services , 2002 .

[28]  Vincent M. Stanford,et al.  Using Pervasive Computing to Deliver Elder Care , 2002, IEEE Pervasive Comput..

[29]  John Canny,et al.  Some Techniques for Privacy in Ubicomp and Context-Aware Applications , 2002 .

[30]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[31]  Einar Snekkenes,et al.  Concepts for personal location privacy policies , 2001, EC '01.

[32]  Abdelsalam Helal,et al.  Drishti: an integrated navigation system for visually impaired and disabled , 2001, Proceedings Fifth International Symposium on Wearable Computers.

[33]  Fredrik Espinoza,et al.  GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.

[34]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[35]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[36]  Eliseo Clementini,et al.  Integration of Imperfect Spatial Information , 2001, J. Vis. Lang. Comput..

[37]  Peter Ljungstrand,et al.  Context Awareness and Mobile Phones , 2001, Personal and Ubiquitous Computing.

[38]  M. Worboys,et al.  A formal approach to imperfection in geographic information , 2001 .

[39]  Chris Schmandt,et al.  Location-Aware Information Delivery with ComMotion , 2000, HUC.

[40]  Albrecht Schmidt,et al.  There is more to context than location , 1999, Comput. Graph..

[41]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[42]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[43]  David Brin,et al.  The Transparent Society , 1998 .

[44]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[45]  H. Onsrud,et al.  Protecting personal privacy in using geographic information systems , 1994 .

[46]  Stefan A. Brands,et al.  Untraceable Off-line Cash in Wallet with Observers , 2002 .

[47]  Michael G. Lamming,et al.  Locating Systems at Work: Implications for the Development of Active Badge Applications , 1992, Interact. Comput..

[48]  Richard Harper,et al.  Looking at ourselves: an examination of the social organisation of two research laboratories , 1992, CSCW '92.

[49]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[50]  R. Priest Data Protection Act , 1988 .

[51]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[52]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[53]  James B. Rule,et al.  Private Lives and Public Surveillance. , 1975 .

[54]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .