-
2
-
-
33646156642
-
A formal model of obfuscation and negotiation for location privacy
-
Lecture Notes in Computer Science. Springer, Berlin
-
M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive 2005, Lecture Notes in Computer Science. Springer, Berlin, 2005.
-
(2005)
Pervasive 2005
-
-
Duckham, M.1
Kulik, L.2
-
3
-
-
0038309563
-
Imprecise navigation
-
M. Duckham, L. Kulik, and M. F. Worboys, Imprecise navigation. GeoInformatica, 7(2):79-94, 2003.
-
(2003)
GeoInformatica
, vol.7
, Issue.2
, pp. 79-94
-
-
Duckham, M.1
Kulik, L.2
Worboys, M.F.3
-
4
-
-
0036992249
-
Framework for security and privacy in automotive telematics
-
ACM Press
-
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez., M. Singh, and J-M. Tang. Framework for security and privacy in automotive telematics. In Proc. 2nd International Workshop on Mobile Commerce, pages 25-32. ACM Press, 2002.
-
(2002)
Proc. 2nd International Workshop on Mobile Commerce
, pp. 25-32
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.-M.7
-
5
-
-
0034288747
-
The graph Voronoi diagram with applications
-
M. Erwig. The graph Voronoi diagram with applications. Networks, 36(3): 156-163, 2000.
-
(2000)
Networks
, vol.36
, Issue.3
, pp. 156-163
-
-
Erwig, M.1
-
6
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. MobiSys '03, pages 31-42, 2003.
-
(2003)
Proc. MobiSys '03
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
7
-
-
35048866963
-
A methodological assessment of location privacy risks in wireless hotspot networks
-
D. Hutter, G. Müller, and W. Stephan, editors, Security in Pervasive Computing, Springer
-
M. Gruteser and D. Grunwald. A methodological assessment of location privacy risks in wireless hotspot networks. In D. Hutter, G. Müller, and W. Stephan, editors, Security in Pervasive Computing, volume 2802 of Lecture Notes in Computer Science, pages 10-24. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2802
, pp. 10-24
-
-
Gruteser, M.1
Grunwald, D.2
-
9
-
-
77956159286
-
User needs for location-aware mobile services
-
E. Kaasinen. User needs for location-aware mobile services. Personal and Ubiquitous Computing, 7(1):70-79, 2003.
-
(2003)
Personal and Ubiquitous Computing
, vol.7
, Issue.1
, pp. 70-79
-
-
Kaasinen, E.1
-
10
-
-
84945556728
-
Privacy by design - Principles of privacy-aware ubiquitous systems
-
G. D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001: Ubiquitous Computing, Springer
-
M. Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In G. D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001: Ubiquitous Computing, volume 2201 of Lecture Notes in Computer Science, pages 273-291. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
11
-
-
0742276510
-
-
The National Academies Press, Washington, DC
-
R.R. Muntz, T. Barclay, J. Dozier, C. Faloutsos. A.M. Maceachren, J.L. Martin, C.M. Pancake, and M Satyanarayanan. IT Roadmap to a Geospatial Future. The National Academies Press, Washington, DC, 2003.
-
(2003)
IT Roadmap to A Geospatial Future
-
-
Muntz, R.R.1
Barclay, T.2
Dozier, J.3
Faloutsos, C.4
Maceachren, A.M.5
Martin, J.L.6
Pancake, C.M.7
Satyanarayanan, M.8
-
12
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
H. Federrath, editor, Designing Privacy Enhancing Technologies, Springer
-
A. Pfitzmann and M. Köhntopp. Anonymity, unobservability, and pseudonymity - a proposal for terminology. In H. Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of Lecture Notes in Computer Science, pages 1-9. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
13
-
-
0347380855
-
Wireless location privacy protection
-
B. Schilit, J. Hong, and M. Gruteser. Wireless location privacy protection. IEEE Computer, 36(12):135-137, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.12
, pp. 135-137
-
-
Schilit, B.1
Hong, J.2
Gruteser, M.3
|