Network Location Privacy Protection with Multi-access Edge Computing
暂无分享,去创建一个
[1] Arjan Durresi,et al. Routing Loops in DAG-Based Low Power and Lossy Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[2] Hubertus Feussner,et al. Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge Computing , 2015, 2015 12th International Conference on Information Technology - New Generations.
[3] Arjan Durresi,et al. Video over Software-Defined Networking (VSDN) , 2013, 2013 16th International Conference on Network-Based Information Systems.
[4] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[5] Lars Eggert,et al. Host Identity Protocol (HIP) Registration Extension , 2016, RFC.
[6] David K. Y. Yau,et al. Privacy vulnerability of published anonymous mobility traces , 2013, TNET.
[7] Michael Till Beck,et al. Mobile Edge Computing: A Taxonomy , 2014 .
[8] Ejaz Ahmed,et al. A survey on mobile edge computing , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[9] Arjan Durresi,et al. Cloud aided Internet mobility , 2013, 2013 IEEE International Conference on Communications (ICC).
[10] Mimoza Durresi,et al. Sensor inter-vehicle communication for safer highways , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[11] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[12] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[13] Maria Luisa Damiani. Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS: Research Issues and Trends , 2013, European Data Protection.
[14] Dario Pompili,et al. Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.
[15] Dario Pompili,et al. Joint Task Offloading and Resource Allocation for Multi-Server Mobile-Edge Computing Networks , 2017, IEEE Transactions on Vehicular Technology.
[16] Mimoza Durresi,et al. Multi-access edge computing aided mobility for privacy protection in Internet of Things , 2018, Computing.
[17] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[18] Mimoza Durresi,et al. Mobile Privacy Protection Enhanced with Multi-access Edge Computing , 2018, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).
[19] Mahesh K. Marina,et al. On the Inference of User Paths from Anonymized Mobility Data , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[20] Frank Dürr,et al. A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.
[21] Vana Kalogeraki,et al. Location privacy for crowdsourcing applications , 2016, UbiComp.
[22] Arjan Durresi,et al. Cloud aided internet mobility for privacy protection , 2017, 2017 IEEE International Conference on Communications (ICC).
[23] Sugih Jamin,et al. Inet-3.0: Internet Topology Generator , 2002 .
[24] Leonard Barolli,et al. A selective border-casting zone routing protocol for ad-hoc networks , 2004 .
[25] Lionel Brunie,et al. Differentially Private Location Privacy in Practice , 2014, ArXiv.