A Heuristic Algorithm for Mobility-aware Location Obfuscation
暂无分享,去创建一个
Karl Aberer | Berker Agir | Iris Safaka | Malik Beytrison | K. Aberer | I. Safaka | Berker Agir | Malik Beytrison
[1] Philippe Golle,et al. On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.
[2] Karl Aberer,et al. User-side adaptive protection of location privacy in participatory sensing , 2013, GeoInformatica.
[3] Carlo Ratti,et al. Human mobility prediction based on individual and collective geographical preferences , 2010, 13th International IEEE Conference on Intelligent Transportation Systems.
[4] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[5] Elisa Bertino,et al. Preventing velocity-based linkage attacks in location-aware applications , 2009, GIS.
[6] Zygmunt J. Haas,et al. Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[7] Frank Dürr,et al. A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.
[8] Reza Shokri,et al. A distortion-based metric for location privacy , 2009, WPES '09.
[9] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[10] Jianliang Xu,et al. Privacy-Conscious Location-Based Queries in Mobile Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.
[11] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[12] George Danezis,et al. Quantifying Location Privacy: The Case of Sporadic Location Exposure , 2011, PETS.
[13] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.