-
1
-
-
69949136379
-
-
http://en.wikipedia.org/wiki/Bluedating
-
-
-
-
2
-
-
69949128849
-
-
http://www.aka-aki.com
-
-
-
-
3
-
-
69949123660
-
-
http://csg.ethz.ch/research/projects/Blue-star
-
-
-
-
4
-
-
69949125449
-
-
http://reality.media.mit/serendipity.php
-
-
-
-
5
-
-
69949115358
-
-
TIGER maps
-
TIGER maps, http://www.census.gov/geo/www/tiger/
-
-
-
-
10
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 30-45. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
11
-
-
69949182653
-
-
Bohme, R., Danezis, G., Diaz, C., Kopsell, S., Pfitzmann, A.: Mix cascades vs. peer-to-peer: Is one concept superior? In: PET (2004)
-
Bohme, R., Danezis, G., Diaz, C., Kopsell, S., Pfitzmann, A.: Mix cascades vs. peer-to-peer: Is one concept superior? In: PET (2004)
-
-
-
-
12
-
-
38149010558
-
-
Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572, pp. 129-141. Springer, Heidelberg (2007)
-
Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129-141. Springer, Heidelberg (2007)
-
-
-
-
13
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
14
-
-
35248866624
-
-
Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, 2760, pp. 1-17. Springer, Heidelberg (2003)
-
Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 1-17. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
84957800033
-
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 54-68. Springer, Heidelberg (2003)
-
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003)
-
-
-
-
16
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium, pp. 21-21 (2004)
-
(2004)
USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
17
-
-
69949119487
-
-
Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.-P.: Mix zones for location privacy in vehicular networks. In: WiN-ITS (2007)
-
Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.-P.: Mix zones for location privacy in vehicular networks. In: WiN-ITS (2007)
-
-
-
-
18
-
-
10644232760
-
-
Kluwer Academic Publishers, Dordrecht
-
Gazis, D.C.: Traffic Theory. Kluwer Academic Publishers, Dordrecht (2002)
-
(2002)
Traffic Theory
-
-
Gazis, D.C.1
-
19
-
-
44849122540
-
Understanding individual human mobility patterns
-
Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.-L.: Understanding individual human mobility patterns. Nature 453 (7196), 779-782 (2008)
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
20
-
-
57349141867
-
-
Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: MobiSys, pp. 40-53 (2008)
-
Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: MobiSys, pp. 40-53 (2008)
-
-
-
-
21
-
-
85018204196
-
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, pp. 31-42 (2003)
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, pp. 31-42 (2003)
-
-
-
-
22
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mobile Networks and Applications 10(3), 315-325 (2005)
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
24
-
-
84915005479
-
Probability of error, equivocation, and the Chernoff bound
-
Hellman, M., Raviv, J.: Probability of error, equivocation, and the Chernoff bound. IEEE Transactions on Information Theory 16(4), 368-372 (1970)
-
(1970)
IEEE Transactions on Information Theory
, vol.16
, Issue.4
, pp. 368-372
-
-
Hellman, M.1
Raviv, J.2
-
25
-
-
33847315663
-
-
Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM, pp. 194-205 (2005)
-
Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM, pp. 194-205 (2005)
-
-
-
-
26
-
-
69949142271
-
-
Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J.-C., Bayen, A.M., Annavaram, M., Jacobson, Q.: Virtual trip lines for distributed privacy-preserving traffic monitoring. In: MobiSys, pp. 15-28 (2008)
-
Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J.-C., Bayen, A.M., Annavaram, M., Jacobson, Q.: Virtual trip lines for distributed privacy-preserving traffic monitoring. In: MobiSys, pp. 15-28 (2008)
-
-
-
-
27
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing 5(4), 38-46 (2006)
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
28
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: WCNC, pp. 1187-1192 (2005)
-
(2005)
WCNC
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
29
-
-
33746099349
-
-
Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, pp. 59-77. Springer, Heidelberg (2006)
-
Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 59-77. Springer, Heidelberg (2006)
-
-
-
-
30
-
-
33745840780
-
-
Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Silent cascade: Enhancing location privacy without communication QoS degradation. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, 3934, pp. 165-180. Springer, Heidelberg (2006) 234
-
Huang, L., Yamane, H., Matsuura, K., Sezaki, K.: Silent cascade: Enhancing location privacy without communication QoS degradation. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 165-180. Springer, Heidelberg (2006) 234
-
-
-
-
31
-
-
35449007284
-
-
Jiang, T., Wang, H.J., Hu, Y.-C.: Preserving location privacy in wireless LANs. In: MobiSys, pp. 246-257 (2007)
-
Jiang, T., Wang, H.J., Hu, Y.-C.: Preserving location privacy in wireless LANs. In: MobiSys, pp. 246-257 (2007)
-
-
-
-
32
-
-
65249157560
-
The divergence and Bhattacharyya distance measures in signal selection
-
Kailath, T.: The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology 15(1), 52-60 (1967)
-
(1967)
IEEE Transactions on Communication Technology
, vol.15
, Issue.1
, pp. 52-60
-
-
Kailath, T.1
-
33
-
-
69949185734
-
-
Krajzewicz, D., Hertkorn, G., Rossel, C., Wagner, P.: SUMO (Simulation of Urban MObility) an open-source traffic simulation. In: MESM (2002)
-
Krajzewicz, D., Hertkorn, G., Rossel, C., Wagner, P.: SUMO (Simulation of Urban MObility) an open-source traffic simulation. In: MESM (2002)
-
-
-
-
34
-
-
38049035427
-
Inference attacks on location tracks
-
LaMarca, A, Langheinrich, M, Truong, K.N, eds, Pervasive 2007, Springer, Heidelberg
-
Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127-143. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4480
, pp. 127-143
-
-
Krumm, J.1
-
35
-
-
85072484577
-
A Markov model for driver route prediction
-
Krumm, J.: A Markov model for driver route prediction. In: SAE World Congress (2008)
-
(2008)
SAE World Congress
-
-
Krumm, J.1
-
37
-
-
84885223558
-
-
Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: WPES, pp. 19-28 (2006)
-
Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: WPES, pp. 19-28 (2006)
-
-
-
-
38
-
-
0025952277
-
Divergence measures based on the Shannon entropy
-
Lin, J.: Divergence measures based on the Shannon entropy. IEEE Transactions on Information theory 37, 145-151 (1991)
-
(1991)
IEEE Transactions on Information theory
, vol.37
, pp. 145-151
-
-
Lin, J.1
-
39
-
-
70349337434
-
-
De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via locationprofiling in GSM networks. In: WPES, pp. 23-32 (2008)
-
De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via locationprofiling in GSM networks. In: WPES, pp. 23-32 (2008)
-
-
-
-
40
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - a proposal for terminology
-
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Designing Privacy Enhancing Technologies, pp. 1-9 (2001)
-
(2001)
Designing Privacy Enhancing Technologies
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
41
-
-
51349157157
-
-
Rasmussen, B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: SECURECOMM, pp. 331-340 (2007)
-
Rasmussen, B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: SECURECOMM, pp. 331-340 (2007)
-
-
-
-
42
-
-
80455138227
-
-
ESCAR 2005
-
Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: Providing location privacy for VANET. In: ESCAR (2005)
-
CARAVAN: Providing location privacy for VANET
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
43
-
-
84957802536
-
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 41-53. Springer, Heidelberg (2003)
-
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41-53. Springer, Heidelberg (2003)
-
-
-
-
45
-
-
24344501784
-
-
Tóth, G., Hornák, Z.: Measuring anonymity in a non-adaptive, real-time system. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 226-241. Springer, Heidelberg (2005)
-
Tóth, G., Hornák, Z.: Measuring anonymity in a non-adaptive, real-time system. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 226-241. Springer, Heidelberg (2005)
-
-
-
-
46
-
-
33745744414
-
-
Wong, F.-L., Stajano, F.: Location privacy in Bluetooth. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, 3813, pp. 176-188. Springer, Heidelberg (2005)
-
Wong, F.-L., Stajano, F.: Location privacy in Bluetooth. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 176-188. Springer, Heidelberg (2005)
-
-
-
-
47
-
-
14944368943
-
-
Xu, Q., Mak, T., Ko, J., Sengupta, R.: Vehicle-to-vehicle safety messaging in DSRC. In: VANET, pp. 19-28 (2004)
-
Xu, Q., Mak, T., Ko, J., Sengupta, R.: Vehicle-to-vehicle safety messaging in DSRC. In: VANET, pp. 19-28 (2004)
-
-
-
|