k-Nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services
暂无分享,去创建一个
Hyunjo Lee | Jae-Woo Chang | Jung-Ho Um | Yong-Ki Kim | Mi-Young Jang | Yong-Ki Kim | Jae-Woo Chang | Hyunjo Lee | Jung-Ho Um | Miyoung Jang
[1] Jae-Woo Chang,et al. A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services , 2009, 2009 11th IEEE International Conference on High Performance Computing and Communications.
[2] Marco Gruteser,et al. USENIX Association , 1992 .
[3] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[4] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[5] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[6] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[7] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[8] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[9] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[10] D. Mohapatra,et al. Survey of location based wireless services , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..
[11] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[12] Atsuyuki Okabe,et al. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams , 1992, Wiley Series in Probability and Mathematical Statistics.
[13] Haibo Hu,et al. Range Nearest-Neighbor Query , 2006, IEEE Trans. Knowl. Data Eng..
[14] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[16] Yannis Theodoridis,et al. On the Generation of Spatiotemporal Datasets , 1999 .
[17] Suman Nath,et al. Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee , 2009, SSTD.
[18] Jianliang Xu,et al. Privacy-Conscious Location-Based Queries in Mobile Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.
[19] Panos Kalnis,et al. MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.
[20] Jae-Woo Chang,et al. A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[21] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .
[22] Hua Lu,et al. PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.
[23] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .