메뉴 건너뛰기




Volumn , Issue , 2007, Pages 278-282

Protecting moving trajectories with dummies

Author keywords

Location privacy; Location based services; User movement patterns

Indexed keywords

CANNING; GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS; LOCATION; MANAGEMENT INFORMATION SYSTEMS; TRAJECTORIES;

EID: 48649103506     PISSN: 15516245     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MDM.2007.58     Document Type: Conference Paper
Times cited : (148)

References (11)
  • 1
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Alastair R. Beresford and Frank Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-90, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 6
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis
    • Marco Gruteser and Dirk Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis. ACM Mobile Networks and Applications (MONET), 10(3):315-325, 2005.
    • (2005) ACM Mobile Networks and Applications (MONET) , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 10
    • 0037250053 scopus 로고    scopus 로고
    • Developing data allocation schemes by incremental mining of user moving patterns in a mobile computing system
    • Wen-Chih Peng and Ming-Syan Chen. Developing data allocation schemes by incremental mining of user moving patterns in a mobile computing system. IEEE Transactions on Knowledge and Data Engineering (TKDE), 15(1):70-85, 2003.
    • (2003) IEEE Transactions on Knowledge and Data Engineering (TKDE) , vol.15 , Issue.1 , pp. 70-85
    • Peng, W.-C.1    Chen, M.-S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.