메뉴 건너뛰기




Volumn 4605 LNCS, Issue , 2007, Pages 221-238

MOBIHIDE: A mobilea peer-to-peer system for anonymous location-based queries

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PRIVACY; MOBILE PHONES; PERSONAL DIGITAL ASSISTANTS; QUERY PROCESSING; TELECOMMUNICATION SERVICES; USER INTERFACES;

EID: 37849047285     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73540-3_13     Document Type: Conference Paper
Times cited : (145)

References (20)
  • 1
    • 37849033568 scopus 로고    scopus 로고
    • p2psim: The Peer-to-Peer Network Simulator, http://pdos.csail.mit.edu/ p2psim.
    • p2psim: The Peer-to-Peer Network Simulator, http://pdos.csail.mit.edu/ p2psim.
  • 2
    • 36849056696 scopus 로고    scopus 로고
    • Online
    • Tor: Anonymity Online, http://tor.eff.org/
    • Anonymity
    • Tor1
  • 3
    • 0036606530 scopus 로고    scopus 로고
    • A framework for generating network-based moving objects
    • Brinkhoff, T.: A framework for generating network-based moving objects. Geoinformatica 6(2), 153-180 (2002)
    • (2002) Geoinformatica , vol.6 , Issue.2 , pp. 153-180
    • Brinkhoff, T.1
  • 6
    • 2442586702 scopus 로고    scopus 로고
    • Ganesan, P., Gummadi, K., Garcia-Molina, H.: Canon in G Major: Designing DHTs with Hierarchical Structure. In: Proc. of ICDCS, pp. 263-272 (2004)
    • Ganesan, P., Gummadi, K., Garcia-Molina, H.: Canon in G Major: Designing DHTs with Hierarchical Structure. In: Proc. of ICDCS, pp. 263-272 (2004)
  • 7
    • 27944454864 scopus 로고    scopus 로고
    • Location Privacy in Mobile Systems: A Personalized Anonymization Model
    • Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: Proc. of ICDCS, pp. 620-629 (2005)
    • (2005) Proc. of ICDCS , pp. 620-629
    • Gedik, B.1    Liu, L.2
  • 8
    • 35348924316 scopus 로고    scopus 로고
    • PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems
    • Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In: Proc of WWW (2007)
    • (2007) Proc of WWW
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 9
    • 1642286258 scopus 로고    scopus 로고
    • Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
    • Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of USENIX MobiSys (2003)
    • (2003) Proc. of USENIX MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 10
    • 73049095468 scopus 로고    scopus 로고
    • Protecting Location Privacy through Path Confusion
    • Hoh, B., Gruteser, M.: Protecting Location Privacy through Path Confusion. In: Proc. of SecureComm (2005)
    • (2005) Proc. of SecureComm
    • Hoh, B.1    Gruteser, M.2
  • 11
    • 31344477599 scopus 로고    scopus 로고
    • Range Nearest-Neighbor Query
    • Hu, H., Lee, D.L.: Range Nearest-Neighbor Query. IEEE TKDE 18(1), 78-91 (2006)
    • (2006) IEEE TKDE , vol.18 , Issue.1 , pp. 78-91
    • Hu, H.1    Lee, D.L.2
  • 12
    • 37849019629 scopus 로고    scopus 로고
    • Preserving Anonymity in Location Based Services
    • Technical Report TRB6/06, National University of Singapore
    • Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Anonymity in Location Based Services. Technical Report TRB6/06, National University of Singapore (2006)
    • (2006)
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 13
    • 27944449345 scopus 로고    scopus 로고
    • Enhancing Source-Location Privacy in Sensor Network Routing
    • Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: Proc. of ICDCS (2005)
    • (2005) Proc. of ICDCS
    • Kamat, P.1    Zhang, Y.2    Trappe, W.3    Ozturk, C.4
  • 15
    • 34547720006 scopus 로고    scopus 로고
    • The New Casper: Query Processing for Location Services without Compromising Privacy
    • Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB (2006)
    • (2006) Proc. of VLDB
    • Mokbel, M.F.1    Chow, C.Y.2    Aref, W.G.3
  • 16
    • 0035049112 scopus 로고    scopus 로고
    • Analysis of the Clustering Properties of the Hilbert Space-Filling Curve
    • Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE 13(1), 124-141 (2001)
    • (2001) IEEE TKDE , vol.13 , Issue.1 , pp. 124-141
    • Moon, B.1    Jagadish, H.V.2    Faloutsos, C.3    Saltz, J.H.4
  • 17
    • 0035517699 scopus 로고    scopus 로고
    • Protecting Respondents' Identities in Microdata Release
    • Samarati, P.: Protecting Respondents' Identities in Microdata Release. IEEE TKDE 13(6), 1010-1027 (2001)
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 20
    • 0036811662 scopus 로고    scopus 로고
    • Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557-570 (2002)
    • Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557-570 (2002)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.