Secure Mix-Zones for Privacy Protection of Road Network Location Based Services Users
暂无分享,去创建一个
[1] Jamalul-lail Ab Manan,et al. Privacy preservation in Location-Based Services (LBS) through Trusted Computing technology , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).
[2] Mohamed F. Mokbel,et al. Identifying Unsafe Routes for Network-Based Trajectory Privacy , 2009, SDM.
[3] Yufei Tao,et al. Continuous Nearest Neighbor Search , 2002, VLDB.
[4] Karim Emara. Location privacy in vehicular networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[5] Chi-Yin Chow,et al. Trajectory privacy in location-based services and data publication , 2011, SKDD.
[6] Panos Kalnis,et al. Providing K-Anonymity in location based services , 2010, SKDD.
[7] Aris Gkoulalas-Divanis,et al. A k-Anonymity Model for Spatio-Temporal Data , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.
[8] Panagiotis Papadimitratos,et al. VeSPA: vehicular security and privacy-preserving architecture , 2013, HotWiSec '13.
[9] Agusti Solanas,et al. Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.
[10] Yuzhe Tang,et al. Location Privacy with Road Network Mix-Zones , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[11] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[12] Nikos Pelekis,et al. HERMES: aggregative LBS via a trajectory DB engine , 2008, SIGMOD Conference.
[13] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[14] Sushil Jajodia,et al. Anonymity in Location-Based Services: Towards a General Framework , 2007, 2007 International Conference on Mobile Data Management.
[15] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[16] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[17] Mark Ryan,et al. Analysing Unlinkability and Anonymity Using the Applied Pi Calculus , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[18] Vijayalakshmi Atluri,et al. Ensuring Privacy and Security for LBS through Trajectory Partitioning , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[19] Reza Shokri,et al. On the Optimal Placement of Mix Zones , 2009, Privacy Enhancing Technologies.
[20] Jimeng Sun,et al. The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries , 2003, VLDB.
[21] Marco Gruteser,et al. USENIX Association , 1992 .
[22] Hassan Takabi,et al. A collaborative k-anonymity approach for location privacy in location-based services , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[23] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[24] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[25] Martin E. Hellman,et al. Probability of error, equivocation, and the Chernoff bound , 1970, IEEE Trans. Inf. Theory.
[26] Miao Pan,et al. Traffic-aware multiple mix zone placement for protecting location privacy , 2012, 2012 Proceedings IEEE INFOCOM.
[27] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[28] Brejesh Lall,et al. Privacy Protection Through k.anonymity in Location.based Services , 2012 .
[29] Raja Lavanya,et al. Communication Efficient Distributed Decentralized Key Management Framework for Message Authentication in Vanet , 2012 .
[30] Aris Gkoulalas-Divanis,et al. A Free Terrain Model for Trajectory K-Anonymity , 2008, DEXA.