Anonymous Spatial Query on Non-Uniform Data
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[2] David Taniar,et al. Constrained range search query processing on road networks , 2011, Concurr. Comput. Pract. Exp..
[3] Robert H. Deng,et al. Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..
[4] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[5] Geng Zhao,et al. Path $k\hbox{NN}$ Query Processing in Mobile Systems , 2013, IEEE Transactions on Industrial Electronics.
[6] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[7] Elisa Bertino,et al. Controlling data disclosure in computational PIR protocols , 2010, ASIACCS '10.
[8] David Taniar,et al. Spatial Network RNN Queries in GIS , 2011, Comput. J..
[9] David Taniar,et al. Reverse k Nearest Neighbor and Reverse Farthest Neighbor Search on Spatial Networks , 2009, Trans. Large Scale Data Knowl. Centered Syst..
[10] David Taniar,et al. Voronoi-based reverse nearest neighbor query processing on spatial networks , 2009, Multimedia Systems.
[11] Felipe Saint-Jean. Java Implementation of a Single-Database Computationally Symmetric Private Information Retrieval (cSPIR) Protocol , 2005 .
[12] Cyrus Shahabi,et al. Location privacy: going beyond K-anonymity, cloaking and anonymizers , 2011, Knowledge and Information Systems.
[13] Dmitri Asonov. Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.
[14] Haibo Hu,et al. Range Nearest-Neighbor Query , 2006, IEEE Trans. Knowl. Data Eng..
[15] David Taniar,et al. Voronoi-based multi-level range search in mobile navigation , 2011, Multimedia Tools and Applications.
[16] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[17] David Taniar,et al. Bichromatic Reverse Nearest-Neighbor Search in Mobile Systems , 2010, IEEE Systems Journal.
[18] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[19] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[20] David Taniar,et al. Voronoi-based range and continuous range query processing in mobile databases , 2011, J. Comput. Syst. Sci..
[21] David Taniar,et al. Voronoi-Based Continuous $k$ Nearest Neighbor Search in Mobile Navigation , 2011, IEEE Transactions on Industrial Electronics.
[22] Kyriakos Mouratidis,et al. Conceptual partitioning: an efficient method for continuous nearest neighbor monitoring , 2005, SIGMOD '05.
[23] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[24] Stavros Papadopoulos,et al. Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..
[25] Divyakant Agrawal,et al. Generalizing PIR for Practical Private Retrieval of Public Data , 2010, DBSec.
[26] Lars Kulik,et al. Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.
[27] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.