Secure and Privacy-Preserving Data Collection Mechanisms for Connected Vehicles
暂无分享,去创建一个
[1] Thomas A. Dingus,et al. Improving Driver Safety through Naturalistic Data Collection and Analysis Methods , 2010 .
[2] Amirreza Masoumzadeh,et al. Top Location Anonymization for Geosocial Network Datasets , 2013, Trans. Data Priv..
[3] Shuai Li,et al. Demographics inference through Wi-Fi network traffic analysis , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[4] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[5] Dirk Neumann,et al. Data Analytics in Free-Floating Carsharing: Evidence from the City of Berlin , 2015, 2015 48th Hawaii International Conference on System Sciences.
[6] Guoliang Xue,et al. Unobservable Re-authentication for Smartphones , 2013, NDSS.
[7] Yuewu Wang,et al. DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices , 2015, NDSS.
[8] Sushil Jajodia,et al. Encryption-Based Policy Enforcement for Cloud Storage , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[9] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[10] Xiaohui Liang,et al. Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.
[11] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[12] Fabio Massacci,et al. Modelling Quality of Protection in Outsourced Business Processes , 2007 .
[13] Triet Vo Huu,et al. Inferring User Routes and Locations Using Zero-Permission Mobile Sensors , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[14] Michelle F. Heller,et al. Occupant Injury in Motor Vehicle Collisions: Using Field Accident Data from Multiple Sources , 2009 .
[15] Christof Paar,et al. Implementing Data Security and Privacy in Next-Generation Electric Vehicle Systems , 2010 .
[16] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[17] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[18] David Llewellyn-Jones,et al. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol , 2007 .
[19] S. Landau. Control use of data to protect privacy , 2015, Science.
[20] Tadayoshi Kohno,et al. Automobile Driver Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[21] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[22] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[23] Gabi Nakibly,et al. PowerSpy: Location Tracking Using Mobile Device Power Analysis , 2015, USENIX Security Symposium.
[24] Jeffrey K. MacKie-Mason. Can We Afford Privacy from Surveillance? , 2014, IEEE Security & Privacy.
[25] Yao Liu,et al. Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition , 2016, AsiaCCS.
[26] Rajkumar Buyya,et al. Ensuring Security and Privacy Preservation for Cloud Data Services , 2016, ACM Comput. Surv..
[27] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.
[28] John R. Peterson. VEHICLE FIELD DATA COLLECTION , 1974 .
[29] Nikita Borisov,et al. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses , 2016, NDSS.