-
2
-
-
33646153058
-
-
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, 3674, pp. 185-199. Springer, Heidelberg (2005)
-
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 185-199. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
0024861694
-
Fractals for secondary key retrieval
-
ACM Press, New York, NY, USA , doi:10.1145/73721.73746
-
Faloutsos, C., Roseman, S.: Fractals for secondary key retrieval. In: PODS'89: Proceedings of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, pp. 247-252. ACM Press, New York, NY, USA (1989), doi:10.1145/73721.73746
-
(1989)
PODS'89: Proceedings of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
, pp. 247-252
-
-
Faloutsos, C.1
Roseman, S.2
-
4
-
-
37849031301
-
-
Gedik, B, Liu, L, A customizable k-anonymity model for protecting location privacy
-
Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy
-
-
-
-
5
-
-
37849053106
-
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys. USENIX (2003)
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys. USENIX (2003)
-
-
-
-
6
-
-
2342562393
-
Protecting privacy in continuous location-tracking applications
-
Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy 2(2), 28-34 (2004)
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
7
-
-
33846316938
-
Uber the stetige abbildung einer linie auf ein flachenstuck
-
Hilbert, D.: Uber the stetige abbildung einer linie auf ein flachenstuck. Math. Ann. 38, 459-460 (1891)
-
(1891)
Math. Ann
, vol.38
, pp. 459-460
-
-
Hilbert, D.1
-
8
-
-
33745565439
-
Polylogarithmic private approximations and efficient matching
-
New York, NY, USA
-
Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Theory of Cryptography, Third Theory of Cryptography Conference, pp. 245-264. New York, NY, USA (2006)
-
(2006)
Theory of Cryptography, Third Theory of Cryptography Conference
, pp. 245-264
-
-
Indyk, P.1
Woodruff, D.P.2
-
10
-
-
0005128666
-
Analysis of the hilbert curve for representing two-dimensional space
-
Jagadish, H.V.: Analysis of the hilbert curve for representing two-dimensional space. Inf. Process. Lett. 62(1), 17-22 (1997)
-
(1997)
Inf. Process. Lett
, vol.62
, Issue.1
, pp. 17-22
-
-
Jagadish, H.V.1
-
11
-
-
37849019629
-
Preserving anonymity in location based services
-
TRB6/06, National University of Singapore
-
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving anonymity in location based services. A Technical Report TRB6/06, National University of Singapore (2006)
-
(2006)
A Technical Report
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
12
-
-
0010277904
-
Querying multi-dimensional data indexed using the hilbert space-filling curve
-
Lawder, J.K., King, P.J.H.: Querying multi-dimensional data indexed using the hilbert space-filling curve. SIGMOD Record 30(1), 19-24 (2001)
-
(2001)
SIGMOD Record
, vol.30
, Issue.1
, pp. 19-24
-
-
Lawder, J.K.1
King, P.J.H.2
-
13
-
-
84990946182
-
-
Mokbel, M.F.: Towards privacy-aware location-based database servers. In: Barga, R.S., Zhou, X. (eds.) ICDE Workshops, p. 93. IEEE Computer Society Press, Los Alamitos (2006)
-
Mokbel, M.F.: Towards privacy-aware location-based database servers. In: Barga, R.S., Zhou, X. (eds.) ICDE Workshops, p. 93. IEEE Computer Society Press, Los Alamitos (2006)
-
-
-
-
14
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
Bases, Seoul, Korea, pp, ACM Press, New York
-
Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, pp. 763-774. ACM Press, New York (2006)
-
(2006)
Proceedings of the 32nd International Conference on Very Large Data
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
15
-
-
0035049112
-
Analysis of the clustering properties of the hilbert space-filling curve
-
doi:10.1109/69.908985
-
Moon, B., Jagadish, H.v., Faloutsos, C., Saltz, J.H.: Analysis of the clustering properties of the hilbert space-filling curve. IEEE Transactions on Knowledge and Data Engineering 13(1), 124-141 (2001), doi:10.1109/69.908985
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.V.2
Faloutsos, C.3
Saltz, J.H.4
-
16
-
-
0026765595
-
A peano hilbert derived algorithm for compression of angiocardiographic images. In: Computers in Cardiology
-
Los Alamitos
-
Pinciroli, F., Combi, C., Pozzi, G., Negretto, M., Portoni, L., Invernizzi, G.: A peano hilbert derived algorithm for compression of angiocardiographic images. In: Computers in Cardiology, pp. 81-84. IEEE Computer Society Press, Los Alamitos (1991)
-
(1991)
IEEE Computer Society Press
, pp. 81-84
-
-
Pinciroli, F.1
Combi, C.2
Pozzi, G.3
Negretto, M.4
Portoni, L.5
Invernizzi, G.6
-
18
-
-
37849018475
-
-
Samarati, P, Sweeney, L, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
-
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
-
-
-
|