Unleashing the Power of Multi-Server PIR for Enabling Private Access to Spectrum Databases
暂无分享,去创建一个
[1] Mohamed Grissa,et al. Location Privacy in Cognitive Radio Networks: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] Spiridon Bakiras,et al. Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access , 2015, Int. J. Netw. Secur..
[4] Marc-Olivier Killijian,et al. XPIR : Private Information Retrieval for Everyone , 2016, Proc. Priv. Enhancing Technol..
[5] Lei Zhu,et al. Protocol to Access White-Space (PAWS) Databases , 2015, RFC.
[6] Zhenfu Cao,et al. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.
[7] Mohamed Grissa,et al. When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[8] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[9] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[10] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[11] Akihiro Nakao,et al. GENI: A federated testbed for innovative network experiments , 2014, Comput. Networks.
[12] Peng Cheng,et al. Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[13] Yi Li,et al. Optimal strategies for defending location inference attack in database-driven CRNs , 2015, 2015 IEEE International Conference on Communications (ICC).