Preserving User Location Privacy for Location-Based Service
暂无分享,去创建一个
[1] Gabriel Ghinita. Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy , 2009, Trans. Data Priv..
[2] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[3] Thomas F. La Porta,et al. A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice , 2009, IEEE Transactions on Mobile Computing.
[4] Jean-Pierre Hubaux,et al. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices , 2014, IEEE Transactions on Information Forensics and Security.
[5] Ron Steinfeld,et al. Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.
[6] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[9] Tanzima Hashem,et al. "Don't trust anyone": Privacy protection for location-based services , 2011, Pervasive Mob. Comput..
[10] Bart Preneel,et al. Practical privacy-preserving location-sharing based services with aggregate statistics , 2014, WiSec '14.
[11] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[12] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[13] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[14] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[15] Chalee Vorakulpipat,et al. Anonymity preserving framework for location-based information services , 2010, MEDES.
[16] Khalil El-Khatib,et al. Privacy Preserving Scheme for Location-Based Services , 2012, J. Information Security.
[17] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[18] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[19] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[20] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.