Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data
暂无分享,去创建一个
Chengqi Zhang | Ling Chen | Ying Zhang | Xingquan Zhu | Weidong Qiu | Bozhong Liu | Ling Chen | Xingquan Zhu | Bozhong Liu | Weidong Qiu | Chengqi Zhang | Ying Zhang
[1] Cyrus Shahabi,et al. GeoCrowd: enabling query answering with spatial crowdsourcing , 2012, SIGSPATIAL/GIS.
[2] Cyrus Shahabi,et al. A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing , 2014, Proc. VLDB Endow..
[3] Vaidy S. Sunderam,et al. Spatial Task Assignment for Crowd Sensing with Cloaked Locations , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.
[4] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[5] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[6] Elisa Bertino,et al. Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data , 2015, 2015 IEEE International Conference on Information Reuse and Integration.
[7] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[8] Nigel P. Smart,et al. Secure Outsourced Computation , 2011, AFRICACRYPT.
[9] Yudong Zhang,et al. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation , 2014, TheScientificWorldJournal.
[10] Lu Li,et al. Efficient secure similarity computation on encrypted trajectory data , 2015, 2015 IEEE 31st International Conference on Data Engineering.