Privacy for real-time location-based services
暂无分享,去创建一个
[1] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[2] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[3] Telecommunications Board,et al. IT Roadmap to a Geospatial Future , 2003 .
[4] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[5] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[6] Marco Gruteser,et al. Wireless Location Privacy Protection , 2003, Computer.
[7] Tanzima Hashem,et al. Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.
[8] Agusti Solanas,et al. Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.
[9] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[10] Lars Kulik,et al. Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.
[11] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[12] Marco Gruteser,et al. USENIX Association , 1992 .
[13] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[14] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[15] Stephanie Forrest,et al. Anonymous Data Collection in Sensor Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[16] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[17] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[18] Lars Kulik,et al. Distributed Histograms for Processing Aggregate Data from Moving Objects , 2007, 2007 International Conference on Mobile Data Management.
[19] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[20] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[21] Marco Gruteser,et al. A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.
[22] F. Esponda. Everything that is not important: Negative databases [Research Frontier] , 2008, IEEE Computational Intelligence Magazine.
[23] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[24] George Danezis,et al. A study on the value of location privacy , 2006, WPES '06.
[25] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.