Secure and Privacy-Preserving Data Collection Mechanisms for Connected Vehicles

[1]  Thomas A. Dingus,et al.  Improving Driver Safety through Naturalistic Data Collection and Analysis Methods , 2010 .

[2]  Amirreza Masoumzadeh,et al.  Top Location Anonymization for Geosocial Network Datasets , 2013, Trans. Data Priv..

[3]  Shuai Li,et al.  Demographics inference through Wi-Fi network traffic analysis , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[4]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[5]  Dirk Neumann,et al.  Data Analytics in Free-Floating Carsharing: Evidence from the City of Berlin , 2015, 2015 48th Hawaii International Conference on System Sciences.

[6]  Guoliang Xue,et al.  Unobservable Re-authentication for Smartphones , 2013, NDSS.

[7]  Yuewu Wang,et al.  DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices , 2015, NDSS.

[8]  Sushil Jajodia,et al.  Encryption-Based Policy Enforcement for Cloud Storage , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[9]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[10]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[11]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[12]  Fabio Massacci,et al.  Modelling Quality of Protection in Outsourced Business Processes , 2007 .

[13]  Triet Vo Huu,et al.  Inferring User Routes and Locations Using Zero-Permission Mobile Sensors , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[14]  Michelle F. Heller,et al.  Occupant Injury in Motor Vehicle Collisions: Using Field Accident Data from Multiple Sources , 2009 .

[15]  Christof Paar,et al.  Implementing Data Security and Privacy in Next-Generation Electric Vehicle Systems , 2010 .

[16]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[17]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[18]  David Llewellyn-Jones,et al.  Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol , 2007 .

[19]  S. Landau Control use of data to protect privacy , 2015, Science.

[20]  Tadayoshi Kohno,et al.  Automobile Driver Fingerprinting , 2016, Proc. Priv. Enhancing Technol..

[21]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[22]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[23]  Gabi Nakibly,et al.  PowerSpy: Location Tracking Using Mobile Device Power Analysis , 2015, USENIX Security Symposium.

[24]  Jeffrey K. MacKie-Mason Can We Afford Privacy from Surveillance? , 2014, IEEE Security & Privacy.

[25]  Yao Liu,et al.  Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition , 2016, AsiaCCS.

[26]  Rajkumar Buyya,et al.  Ensuring Security and Privacy Preservation for Cloud Data Services , 2016, ACM Comput. Surv..

[27]  Ming Li,et al.  Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.

[28]  John R. Peterson VEHICLE FIELD DATA COLLECTION , 1974 .

[29]  Nikita Borisov,et al.  Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses , 2016, NDSS.