메뉴 건너뛰기




Volumn 3693 LNCS, Issue , 2005, Pages 31-48

Simulation of obfuscation and negotiation for location privacy

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; DATA PROCESSING; MOBILE TELECOMMUNICATION SYSTEMS; QUALITY OF SERVICE;

EID: 33646156642     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11556114_3     Document Type: Conference Paper
Times cited : (49)

References (15)
  • 1
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A.R. Beresford and F. Stajano, Location privacy in pervasive computing, IEEE Pervasive Computing, 2(1):46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 2
    • 33646156642 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Lecture Notes in Computer Science. Springer, Berlin
    • M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Pervasive 2005, Lecture Notes in Computer Science. Springer, Berlin, 2005.
    • (2005) Pervasive 2005
    • Duckham, M.1    Kulik, L.2
  • 5
    • 0034288747 scopus 로고    scopus 로고
    • The graph Voronoi diagram with applications
    • M. Erwig. The graph Voronoi diagram with applications. Networks, 36(3): 156-163, 2000.
    • (2000) Networks , vol.36 , Issue.3 , pp. 156-163
    • Erwig, M.1
  • 6
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. MobiSys '03, pages 31-42, 2003.
    • (2003) Proc. MobiSys '03 , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 7
    • 35048866963 scopus 로고    scopus 로고
    • A methodological assessment of location privacy risks in wireless hotspot networks
    • D. Hutter, G. Müller, and W. Stephan, editors, Security in Pervasive Computing, Springer
    • M. Gruteser and D. Grunwald. A methodological assessment of location privacy risks in wireless hotspot networks. In D. Hutter, G. Müller, and W. Stephan, editors, Security in Pervasive Computing, volume 2802 of Lecture Notes in Computer Science, pages 10-24. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2802 , pp. 10-24
    • Gruteser, M.1    Grunwald, D.2
  • 9
    • 77956159286 scopus 로고    scopus 로고
    • User needs for location-aware mobile services
    • E. Kaasinen. User needs for location-aware mobile services. Personal and Ubiquitous Computing, 7(1):70-79, 2003.
    • (2003) Personal and Ubiquitous Computing , vol.7 , Issue.1 , pp. 70-79
    • Kaasinen, E.1
  • 10
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design - Principles of privacy-aware ubiquitous systems
    • G. D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001: Ubiquitous Computing, Springer
    • M. Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In G. D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001: Ubiquitous Computing, volume 2201 of Lecture Notes in Computer Science, pages 273-291. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2201 , pp. 273-291
    • Langheinrich, M.1
  • 12
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • H. Federrath, editor, Designing Privacy Enhancing Technologies, Springer
    • A. Pfitzmann and M. Köhntopp. Anonymity, unobservability, and pseudonymity - a proposal for terminology. In H. Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of Lecture Notes in Computer Science, pages 1-9. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 13
    • 0347380855 scopus 로고    scopus 로고
    • Wireless location privacy protection
    • B. Schilit, J. Hong, and M. Gruteser. Wireless location privacy protection. IEEE Computer, 36(12):135-137, 2003.
    • (2003) IEEE Computer , vol.36 , Issue.12 , pp. 135-137
    • Schilit, B.1    Hong, J.2    Gruteser, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.