Private queries in location based services: anonymizers are not necessary
暂无分享,去创建一个
Panos Kalnis | Kian-Lee Tan | Cyrus Shahabi | Gabriel Ghinita | Ali Khoshgozaran | Panos Kalnis | K. Tan | C. Shahabi | Gabriel Ghinita | A. Khoshgozaran | Ali Khoshgozaran | G. Ghinita
[1] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[2] Ronald Fagin,et al. Combining fuzzy information from multiple systems (extended abstract) , 1996, PODS.
[3] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[4] Mark de Berg,et al. Computational geometry: algorithms and applications , 1997 .
[5] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[6] Ronald Fagin,et al. Combining Fuzzy Information from Multiple Systems , 1999, J. Comput. Syst. Sci..
[7] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[8] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[9] Christos Faloutsos,et al. Analysis of the Clustering Properties of the Hilbert Space-Filling Curve , 2001, IEEE Trans. Knowl. Data Eng..
[10] Joan Feigenbaum,et al. Secure Multiparty Computation of Approximations , 2001, ICALP.
[11] Marco Gruteser,et al. USENIX Association , 1992 .
[12] Benny Pinkas,et al. Secure Computation of the k th-Ranked Element , 2004, EUROCRYPT.
[13] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[14] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[15] David P. Woodruff,et al. Polylogarithmic Private Approximations and Efficient Matching , 2006, TCC.
[16] A. Meyer,et al. Introduction to Number Theory , 2005 .
[17] Chris Clifton,et al. Privacy - preserving top-k queries , 2005, 21st International Conference on Data Engineering (ICDE'05).
[18] Haibo Hu,et al. Range Nearest-Neighbor Query , 2006, IEEE Trans. Knowl. Data Eng..
[19] Vipin Kumar,et al. Privacy Preserving Nearest Neighbor Search , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[20] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[21] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[22] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[23] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[24] Panos Kalnis,et al. MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.
[25] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[26] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[27] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[28] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[29] Panos Kalnis,et al. A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..