Preserving User Location Privacy in Era of Location-Based Services: Challenges, Techniques and Framework
暂无分享,去创建一个
[1] Chien-Chung Shen,et al. Location-enhanced authenticated key exchange , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[2] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[3] Lan Huang,et al. An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints , 2017, Secur. Commun. Networks.
[4] Marco Gruteser,et al. USENIX Association , 1992 .
[5] Frank Dürr,et al. A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.
[6] Mani B. Srivastava,et al. A framework for context-aware privacy of sensor data on mobile systems , 2013, HotMobile '13.
[7] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[8] Asim Smailagic,et al. Location sensing and privacy in a context-aware computing environment , 2002, IEEE Wirel. Commun..
[9] Frank Dürr,et al. Position sharing for location privacy in non-trusted systems , 2011, PerCom.
[10] Sheng Zhong,et al. Anonymity-preserving data collection , 2005, KDD '05.
[11] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[12] Sheikh Iqbal Ahamed,et al. A privacy preserving framework for RFID based healthcare systems , 2017, Future Gener. Comput. Syst..
[13] Sangjin Lee,et al. Detection and Response of Identity Theft within a Company Utilizing Location Information , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[14] Ben Y. Zhao,et al. Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.
[15] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[16] Christian S. Jensen,et al. Indexing the Positions of Continuously Moving Objects , 2000, SIGMOD Conference.
[17] Traian Marius Truta,et al. Protection : p-Sensitive k-Anonymity Property , 2006 .
[18] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[19] Carlo Ratti,et al. Real-Time Urban Monitoring Using Cell Phones: A Case Study in Rome , 2011, IEEE Transactions on Intelligent Transportation Systems.
[20] Nino Vincenzo Verde,et al. Using classification for role-based access control management , 2016 .