Exploiting Service Similarity for Privacy in Location-Based Search Queries
暂无分享,去创建一个
[1] Cyrus Shahabi,et al. Location privacy: going beyond K-anonymity, cloaking and anonymizers , 2011, Knowledge and Information Systems.
[2] Ying Cai,et al. Feeling-based location privacy protection for location-based services , 2009, CCS.
[3] Kien A. Hua,et al. Query l-diversity in Location-Based Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[4] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[5] K. Mardia. Some properties of clasical multi-dimesional scaling , 1978 .
[6] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[7] Indrajit Ray,et al. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[8] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[9] Marco Gruteser,et al. USENIX Association , 1992 .
[10] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[11] John Langford,et al. Cover trees for nearest neighbor , 2006, ICML.
[12] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[13] Ken C. K. Lee,et al. OPAQUE: Protecting Path Privacy in Directions Search , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[14] Sushil Jajodia,et al. Preserving Anonymity of Recurrent Location-Based Queries , 2009, 2009 16th International Symposium on Temporal Representation and Reasoning.
[15] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[16] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] Vijayalakshmi Atluri,et al. A profile anonymization model for location-based services , 2011, J. Comput. Secur..
[18] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[19] Hua Lu,et al. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[20] Carmela Troncoso,et al. Unraveling an old cloak: k-anonymity for location privacy , 2010, WPES '10.
[21] Stavros Papadopoulos,et al. Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..
[22] Jirí Matousek,et al. Constructing levels in arrangements and higher order Voronoi diagrams , 1994, SCG '94.
[23] Ling Liu,et al. MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[24] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[25] Roberto Di Pietro,et al. Time Warp: How Time Affects Privacy in LBSs , 2010, ICICS.
[26] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[27] Philippe Golle,et al. On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.
[28] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[29] Indrajit Ray,et al. On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS , 2010, SecureComm.
[30] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[31] Hui Zang,et al. Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.
[32] Panos Kalnis,et al. A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..
[33] D. T. Lee,et al. On k-Nearest Neighbor Voronoi Diagrams in the Plane , 1982, IEEE Transactions on Computers.
[34] Franz Aurenhammer,et al. A simple on-line randomized incremental algorithm for computing higher order Voronoi diagrams , 1991, SCG '91.
[35] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[36] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[37] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.