Privacy-Aware Cloaking Technique in Location-Based Services
暂无分享,去创建一个
[1] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[2] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[3] Agusti Solanas,et al. Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.
[4] Sheikh Iqbal Ahamed,et al. ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[5] Takahiro Hara,et al. A user location anonymization method for location based services in a real environment , 2010, GIS '10.
[6] Ling Liu,et al. Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.
[7] Marco Gruteser,et al. USENIX Association , 1992 .
[8] Ling Liu,et al. MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[9] Jianliang Xu,et al. 2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services , 2010, IEEE Transactions on Parallel and Distributed Systems.
[10] Panos Kalnis,et al. PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.
[11] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[12] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[13] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[14] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[15] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[16] Mark de Berg,et al. Computational geometry: algorithms and applications , 1997 .
[17] Tanzima Hashem,et al. Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.
[18] Mohamed F. Mokbel,et al. Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[19] Wang-Chien Lee,et al. Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.
[20] Telecommunications Board,et al. IT Roadmap to a Geospatial Future , 2003 .
[21] Marco Gruteser,et al. Wireless Location Privacy Protection , 2003, Computer.
[22] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[23] Jae-Woo Chang,et al. Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road Networks , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.
[24] Urs Hengartner,et al. A distributed k-anonymity protocol for location privacy , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[25] Haibo Hu,et al. Range Nearest-Neighbor Query , 2006, IEEE Trans. Knowl. Data Eng..