-
1
-
-
37849033568
-
-
p2psim: The Peer-to-Peer Network Simulator, http://pdos.csail.mit.edu/ p2psim.
-
p2psim: The Peer-to-Peer Network Simulator, http://pdos.csail.mit.edu/ p2psim.
-
-
-
-
2
-
-
36849056696
-
-
Online
-
Tor: Anonymity Online, http://tor.eff.org/
-
Anonymity
-
-
Tor1
-
3
-
-
0036606530
-
A framework for generating network-based moving objects
-
Brinkhoff, T.: A framework for generating network-based moving objects. Geoinformatica 6(2), 153-180 (2002)
-
(2002)
Geoinformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
-
4
-
-
34548396941
-
Preserving User Location Privacy in Mobile Data Management Infrastructures
-
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Proc. of Privacy Enhancing Technology Workshop (2006)
-
(2006)
Proc. of Privacy Enhancing Technology Workshop
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
5
-
-
34547474184
-
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
-
ACM Press, New York
-
Chow, C.-Y., Mokbel, M.F., Liu, X.: A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In: ACM International Symposium on Advances in Geographic Information Systems, ACM Press, New York (2006)
-
(2006)
ACM International Symposium on Advances in Geographic Information Systems
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
6
-
-
2442586702
-
-
Ganesan, P., Gummadi, K., Garcia-Molina, H.: Canon in G Major: Designing DHTs with Hierarchical Structure. In: Proc. of ICDCS, pp. 263-272 (2004)
-
Ganesan, P., Gummadi, K., Garcia-Molina, H.: Canon in G Major: Designing DHTs with Hierarchical Structure. In: Proc. of ICDCS, pp. 263-272 (2004)
-
-
-
-
7
-
-
27944454864
-
Location Privacy in Mobile Systems: A Personalized Anonymization Model
-
Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: Proc. of ICDCS, pp. 620-629 (2005)
-
(2005)
Proc. of ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
8
-
-
35348924316
-
PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems
-
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In: Proc of WWW (2007)
-
(2007)
Proc of WWW
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
9
-
-
1642286258
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of USENIX MobiSys (2003)
-
(2003)
Proc. of USENIX MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
10
-
-
73049095468
-
Protecting Location Privacy through Path Confusion
-
Hoh, B., Gruteser, M.: Protecting Location Privacy through Path Confusion. In: Proc. of SecureComm (2005)
-
(2005)
Proc. of SecureComm
-
-
Hoh, B.1
Gruteser, M.2
-
11
-
-
31344477599
-
Range Nearest-Neighbor Query
-
Hu, H., Lee, D.L.: Range Nearest-Neighbor Query. IEEE TKDE 18(1), 78-91 (2006)
-
(2006)
IEEE TKDE
, vol.18
, Issue.1
, pp. 78-91
-
-
Hu, H.1
Lee, D.L.2
-
12
-
-
37849019629
-
Preserving Anonymity in Location Based Services
-
Technical Report TRB6/06, National University of Singapore
-
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Anonymity in Location Based Services. Technical Report TRB6/06, National University of Singapore (2006)
-
(2006)
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
13
-
-
27944449345
-
Enhancing Source-Location Privacy in Sensor Network Routing
-
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: Proc. of ICDCS (2005)
-
(2005)
Proc. of ICDCS
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
14
-
-
33749607006
-
1-Diversity: Privacy Beyond k-Anonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: 1-Diversity: Privacy Beyond k-Anonymity. In: Proc. of ICDE (2006)
-
(2006)
Proc. of ICDE
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
15
-
-
34547720006
-
The New Casper: Query Processing for Location Services without Compromising Privacy
-
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB (2006)
-
(2006)
Proc. of VLDB
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
16
-
-
0035049112
-
Analysis of the Clustering Properties of the Hilbert Space-Filling Curve
-
Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE 13(1), 124-141 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.V.2
Faloutsos, C.3
Saltz, J.H.4
-
17
-
-
0035517699
-
Protecting Respondents' Identities in Microdata Release
-
Samarati, P.: Protecting Respondents' Identities in Microdata Release. IEEE TKDE 13(6), 1010-1027 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
19
-
-
0037298256
-
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
-
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1), 17-32 (2003)
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
20
-
-
0036811662
-
-
Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557-570 (2002)
-
Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557-570 (2002)
-
-
-
|