A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection
暂无分享,去创建一个
[1] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[2] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] Marco Gruteser,et al. Path Privacy in Location-aware Computing , 2004 .
[4] Philippe Golle,et al. Faking contextual data for fun, profit, and privacy , 2009, WPES '09.
[5] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[6] Graham Steel,et al. Formal Analysis of Privacy for Vehicular Mix-Zones , 2010, ESORICS.
[7] Romit Roy Choudhury,et al. Realtime location privacy via mobility prediction: creating confusion at crossroads , 2009, HotMobile '09.
[8] Ling Liu,et al. MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[9] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[10] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[11] George Danezis,et al. Quantifying Location Privacy: The Case of Sporadic Location Exposure , 2011, PETS.
[12] Panos Kalnis,et al. Location Diversity: Enhanced Privacy Protection in Location Based Services , 2009, LoCA.
[13] Hyunjo Lee,et al. Grid-based cloaking area creation scheme supporting continuous location-based services , 2012, SAC '12.
[14] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[15] Roger Zimmermann,et al. Privacy Protected Spatial Query Processing for Advanced Location Based Services , 2009, Wirel. Pers. Commun..
[16] Ying Cai,et al. Location anonymity in continuous location-based services , 2007, GIS.
[17] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[18] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[19] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.
[20] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[21] Jianliang Xu,et al. PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects , 2010, IEEE Transactions on Knowledge and Data Engineering.
[22] Feng Xia,et al. A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[23] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[24] Philip S. Yu,et al. Mobile Systems Privacy: 'MobiPriv' A Robust System for Snapshot or Continuous Querying Location Based Mobile Systems , 2012, Trans. Data Priv..
[25] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[26] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[27] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[28] Divyakant Agrawal,et al. Towards practical private processing of database queries over public data , 2014, Distributed and Parallel Databases.
[29] Chi-Yin Chow,et al. Trajectory privacy in location-based services and data publication , 2011, SKDD.
[30] Wen-Chih Peng,et al. Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..
[31] Yuzhe Tang,et al. Location Privacy with Road Network Mix-Zones , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[32] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[33] Xinwen Fu,et al. Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.
[34] Marco Gruteser,et al. USENIX Association , 1992 .
[35] Jianliang Xu,et al. Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.