-
1
-
-
33745629638
-
On k-Anonymity and the Curse of Dimensionality
-
Aggarwal, C.C.: On k-Anonymity and the Curse of Dimensionality. In: Proc. of VLDB, pp. 901-909 (2005)
-
(2005)
Proc. of VLDB
, pp. 901-909
-
-
Aggarwal, C.C.1
-
2
-
-
28444449426
-
Data Privacy through Optimal k-Anonymization
-
Bayardo, R., Agrawal, R.: Data Privacy through Optimal k-Anonymization. In: Proc. of ICDE, pp. 217-228 (2005)
-
(2005)
Proc. of ICDE
, pp. 217-228
-
-
Bayardo, R.1
Agrawal, R.2
-
3
-
-
0025447750
-
The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles
-
Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles. In: Proc. of ACM SIGMOD, pp. 322-331 (1990)
-
(1990)
Proc. of ACM SIGMOD
, pp. 322-331
-
-
Beckmann, N.1
Kriegel, H.-P.2
Schneider, R.3
Seeger, B.4
-
4
-
-
33646153058
-
-
Bettini, C., SeanWang, X., Jajodia, S.: Protecting Privacy Against Location-Based Personal Identification. In: Jonker, W., Petković, M. (eds.) SDM2005. LNCS, 3674, pp. 185-199. Springer, Heidelberg (2005)
-
Bettini, C., SeanWang, X., Jajodia, S.: Protecting Privacy Against Location-Based Personal Identification. In: Jonker, W., Petković, M. (eds.) SDM2005. LNCS, vol. 3674, pp. 185-199. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
37849011436
-
-
Chow, C.-Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, 4605, pp. 258-275. Springer, Heidelberg (2007)
-
Chow, C.-Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258-275. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
27944454864
-
Location Privacy in Mobile Systems: A Personalized Anonymization Model
-
Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: Proc. of ICDCS, pp. 620-629 (2005)
-
(2005)
Proc. of ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
7
-
-
84988315609
-
Fast Data Anonymization with Low Information Loss
-
Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast Data Anonymization with Low Information Loss. In: Proc. of VLDB, pp. 758-769 (2007)
-
(2007)
Proc. of VLDB
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
8
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of USENIX MobiSys, pp. 31-42 (2003)
-
(2003)
Proc. of USENIX MobiSys
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
9
-
-
49049105013
-
-
Hu, H., Xu, J., Du, J., Ng, J.K.-Y.: Privacy-Aware Location Publishing for Moving Clients. Technical report, Hong Kong Baptist University (2007), http://www.comp.hkbu.edu.hk/~haibo/privacy join.pdf
-
Hu, H., Xu, J., Du, J., Ng, J.K.-Y.: Privacy-Aware Location Publishing for Moving Clients. Technical report, Hong Kong Baptist University (2007), http://www.comp.hkbu.edu.hk/~haibo/privacy join.pdf
-
-
-
-
10
-
-
35648982949
-
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
-
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE TKDE 19(12), 1719-1733 (2007)
-
(2007)
IEEE TKDE
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
11
-
-
29844444250
-
Incognito: Efficient Full-Domain K-Anonymity
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain K-Anonymity. In: Proc. of ACM SIGMOD, pp. 49-60 (2005)
-
(2005)
Proc. of ACM SIGMOD
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
12
-
-
33749607006
-
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proc. of ICDE (2006)
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proc. of ICDE (2006)
-
-
-
-
13
-
-
34547720006
-
The New Casper: Query Processing for Location Services without Compromising Privacy
-
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB, pp. 763-774 (2006)
-
(2006)
Proc. of VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
14
-
-
0035049112
-
Analysis of the Clustering Properties of the Hilbert Space-Filling Curve
-
Moon, B., Jagadish, H., Faloutsos, C.: Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE 13(1), 124-141 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.2
Faloutsos, C.3
-
15
-
-
0018689571
-
An algorithm for tracking multiple targets
-
Reid, D.: An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control 24, 843-854 (1979)
-
(1979)
IEEE Transactions on Automatic Control
, vol.24
, pp. 843-854
-
-
Reid, D.1
-
16
-
-
0035517699
-
Protecting Respondents' Identities in Microdata Release
-
Samarati, P.: Protecting Respondents' Identities in Microdata Release. IEEE TKDE 13(6), 1010-1027 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
17
-
-
0036811662
-
-
Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557-570 (2002)
-
Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557-570 (2002)
-
-
-
-
18
-
-
34250680246
-
Personalized Privacy Preservation
-
Tao, Y., Xiao, X.: Personalized Privacy Preservation. In: Proc. of ACM SIGMOD, pp. 229-240 (2006)
-
(2006)
Proc. of ACM SIGMOD
, pp. 229-240
-
-
Tao, Y.1
Xiao, X.2
|