메뉴 건너뛰기




Volumn 5672 LNCS, Issue , 2009, Pages 216-234

On the optimal placement of mix zones

Author keywords

[No Author keywords available]

Indexed keywords

COMBINATORIAL OPTIMIZATION TECHNIQUES; LOCATION PRIVACY; MOBILE NODES; MOBILE WIRELESS NETWORK; MOBILITY PROFILES; OPTIMAL PLACEMENTS; THIRD PARTIES;

EID: 69949127837     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03168-7_13     Document Type: Conference Paper
Times cited : (125)

References (47)
  • 1
    • 69949136379 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Bluedating
  • 2
    • 69949128849 scopus 로고    scopus 로고
    • http://www.aka-aki.com
  • 3
    • 69949123660 scopus 로고    scopus 로고
    • http://csg.ethz.ch/research/projects/Blue-star
  • 4
    • 69949125449 scopus 로고    scopus 로고
    • http://reality.media.mit/serendipity.php
  • 5
    • 69949115358 scopus 로고    scopus 로고
    • TIGER maps
    • TIGER maps, http://www.census.gov/geo/www/tiger/
  • 7
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46-55 (2003)
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 10
    • 84937549115 scopus 로고    scopus 로고
    • The disadvantages of free MIX routes and how to overcome them
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 30-45. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 30-45
    • Berthold, O.1    Pfitzmann, A.2    Standtke, R.3
  • 11
    • 69949182653 scopus 로고    scopus 로고
    • Bohme, R., Danezis, G., Diaz, C., Kopsell, S., Pfitzmann, A.: Mix cascades vs. peer-to-peer: Is one concept superior? In: PET (2004)
    • Bohme, R., Danezis, G., Diaz, C., Kopsell, S., Pfitzmann, A.: Mix cascades vs. peer-to-peer: Is one concept superior? In: PET (2004)
  • 12
    • 38149010558 scopus 로고    scopus 로고
    • Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572, pp. 129-141. Springer, Heidelberg (2007)
    • Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129-141. Springer, Heidelberg (2007)
  • 13
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 14
    • 35248866624 scopus 로고    scopus 로고
    • Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, 2760, pp. 1-17. Springer, Heidelberg (2003)
    • Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 1-17. Springer, Heidelberg (2003)
  • 15
    • 84957800033 scopus 로고    scopus 로고
    • Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 54-68. Springer, Heidelberg (2003)
    • Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
  • 17
    • 69949119487 scopus 로고    scopus 로고
    • Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.-P.: Mix zones for location privacy in vehicular networks. In: WiN-ITS (2007)
    • Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.-P.: Mix zones for location privacy in vehicular networks. In: WiN-ITS (2007)
  • 18
    • 10644232760 scopus 로고    scopus 로고
    • Kluwer Academic Publishers, Dordrecht
    • Gazis, D.C.: Traffic Theory. Kluwer Academic Publishers, Dordrecht (2002)
    • (2002) Traffic Theory
    • Gazis, D.C.1
  • 19
    • 44849122540 scopus 로고    scopus 로고
    • Understanding individual human mobility patterns
    • Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.-L.: Understanding individual human mobility patterns. Nature 453 (7196), 779-782 (2008)
    • (2008) Nature , vol.453 , Issue.7196 , pp. 779-782
    • Gonzalez, M.C.1    Hidalgo, C.A.2    Barabasi, A.-L.3
  • 20
    • 57349141867 scopus 로고    scopus 로고
    • Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: MobiSys, pp. 40-53 (2008)
    • Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: MobiSys, pp. 40-53 (2008)
  • 21
    • 85018204196 scopus 로고    scopus 로고
    • Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, pp. 31-42 (2003)
    • Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, pp. 31-42 (2003)
  • 22
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mobile Networks and Applications 10(3), 315-325 (2005)
    • (2005) Mobile Networks and Applications , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 24
    • 84915005479 scopus 로고
    • Probability of error, equivocation, and the Chernoff bound
    • Hellman, M., Raviv, J.: Probability of error, equivocation, and the Chernoff bound. IEEE Transactions on Information Theory 16(4), 368-372 (1970)
    • (1970) IEEE Transactions on Information Theory , vol.16 , Issue.4 , pp. 368-372
    • Hellman, M.1    Raviv, J.2
  • 25
    • 33847315663 scopus 로고    scopus 로고
    • Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM, pp. 194-205 (2005)
    • Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM, pp. 194-205 (2005)
  • 26
    • 69949142271 scopus 로고    scopus 로고
    • Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J.-C., Bayen, A.M., Annavaram, M., Jacobson, Q.: Virtual trip lines for distributed privacy-preserving traffic monitoring. In: MobiSys, pp. 15-28 (2008)
    • Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J.-C., Bayen, A.M., Annavaram, M., Jacobson, Q.: Virtual trip lines for distributed privacy-preserving traffic monitoring. In: MobiSys, pp. 15-28 (2008)
  • 27
    • 33750879264 scopus 로고    scopus 로고
    • Enhancing security and privacy in traffic-monitoring systems
    • Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing 5(4), 38-46 (2006)
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.4 , pp. 38-46
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 28
    • 24944489750 scopus 로고    scopus 로고
    • Enhancing wireless location privacy using silent period
    • Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: WCNC, pp. 1187-1192 (2005)
    • (2005) WCNC , pp. 1187-1192
    • Huang, L.1    Matsuura, K.2    Yamane, H.3    Sezaki, K.4
  • 29
    • 33746099349 scopus 로고    scopus 로고
    • Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, pp. 59-77. Springer, Heidelberg (2006)
    • Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 59-77. Springer, Heidelberg (2006)
  • 30
    • 33745840780 scopus 로고    scopus 로고
    • Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Silent cascade: Enhancing location privacy without communication QoS degradation. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, 3934, pp. 165-180. Springer, Heidelberg (2006) 234
    • Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Silent cascade: Enhancing location privacy without communication QoS degradation. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 165-180. Springer, Heidelberg (2006) 234
  • 31
    • 35449007284 scopus 로고    scopus 로고
    • Jiang, T., Wang, H.J., Hu, Y.-C.: Preserving location privacy in wireless LANs. In: MobiSys, pp. 246-257 (2007)
    • Jiang, T., Wang, H.J., Hu, Y.-C.: Preserving location privacy in wireless LANs. In: MobiSys, pp. 246-257 (2007)
  • 32
    • 65249157560 scopus 로고
    • The divergence and Bhattacharyya distance measures in signal selection
    • Kailath, T.: The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology 15(1), 52-60 (1967)
    • (1967) IEEE Transactions on Communication Technology , vol.15 , Issue.1 , pp. 52-60
    • Kailath, T.1
  • 33
    • 69949185734 scopus 로고    scopus 로고
    • Krajzewicz, D., Hertkorn, G., Rossel, C., Wagner, P.: SUMO (Simulation of Urban MObility) an open-source traffic simulation. In: MESM (2002)
    • Krajzewicz, D., Hertkorn, G., Rossel, C., Wagner, P.: SUMO (Simulation of Urban MObility) an open-source traffic simulation. In: MESM (2002)
  • 34
    • 38049035427 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • LaMarca, A, Langheinrich, M, Truong, K.N, eds, Pervasive 2007, Springer, Heidelberg
    • Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127-143. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4480 , pp. 127-143
    • Krumm, J.1
  • 35
    • 85072484577 scopus 로고    scopus 로고
    • A Markov model for driver route prediction
    • Krumm, J.: A Markov model for driver route prediction. In: SAE World Congress (2008)
    • (2008) SAE World Congress
    • Krumm, J.1
  • 37
    • 84885223558 scopus 로고    scopus 로고
    • Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: WPES, pp. 19-28 (2006)
    • Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: WPES, pp. 19-28 (2006)
  • 38
    • 0025952277 scopus 로고
    • Divergence measures based on the Shannon entropy
    • Lin, J.: Divergence measures based on the Shannon entropy. IEEE Transactions on Information theory 37, 145-151 (1991)
    • (1991) IEEE Transactions on Information theory , vol.37 , pp. 145-151
    • Lin, J.1
  • 39
    • 70349337434 scopus 로고    scopus 로고
    • De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via locationprofiling in GSM networks. In: WPES, pp. 23-32 (2008)
    • De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via locationprofiling in GSM networks. In: WPES, pp. 23-32 (2008)
  • 40
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - a proposal for terminology
    • Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Designing Privacy Enhancing Technologies, pp. 1-9 (2001)
    • (2001) Designing Privacy Enhancing Technologies , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 41
    • 51349157157 scopus 로고    scopus 로고
    • Rasmussen, B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: SECURECOMM, pp. 331-340 (2007)
    • Rasmussen, B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: SECURECOMM, pp. 331-340 (2007)
  • 43
    • 84957802536 scopus 로고    scopus 로고
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
  • 45
    • 24344501784 scopus 로고    scopus 로고
    • Tóth, G., Hornák, Z.: Measuring anonymity in a non-adaptive, real-time system. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 226-241. Springer, Heidelberg (2005)
    • Tóth, G., Hornák, Z.: Measuring anonymity in a non-adaptive, real-time system. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 226-241. Springer, Heidelberg (2005)
  • 46
    • 33745744414 scopus 로고    scopus 로고
    • Wong, F.-L., Stajano, F.: Location privacy in Bluetooth. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, 3813, pp. 176-188. Springer, Heidelberg (2005)
    • Wong, F.-L., Stajano, F.: Location privacy in Bluetooth. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 176-188. Springer, Heidelberg (2005)
  • 47
    • 14944368943 scopus 로고    scopus 로고
    • Xu, Q., Mak, T., Ko, J., Sengupta, R.: Vehicle-to-vehicle safety messaging in DSRC. In: VANET, pp. 19-28 (2004)
    • Xu, Q., Mak, T., Ko, J., Sengupta, R.: Vehicle-to-vehicle safety messaging in DSRC. In: VANET, pp. 19-28 (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.