-
1
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
May
-
M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking", in Proceedings of 1st International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), May 2003, pp. 31-42.
-
(2003)
Proceedings of 1st International Conference on Mobile Systems, Applications, and Services (MobiSys 2003)
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
2
-
-
57349191501
-
Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid
-
April
-
B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid", in Proceedings of 17th International World Wide Web Conference (WWW2008), April 2008, pp. 237-248.
-
(2008)
Proceedings of 17th International World Wide Web Conference (WWW2008)
, pp. 237-248
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
3
-
-
33745844081
-
Location privacy in ubiquitous computing
-
Computer Laboratory, University of Cambridge, Tech. Rep. 612, January
-
A. R. Beresford, "Location privacy in ubiquitous computing", Computer Laboratory, University of Cambridge, Tech. Rep. 612, January 2005.
-
(2005)
-
-
Beresford, A.R.1
-
4
-
-
85020160358
-
Anonymity in Location-based Services: Towards a General Framework
-
May
-
C. Bettini, S. Mascetti, X. S. Wang, and S. Jajodia, "Anonymity in Location-based Services: Towards a General Framework", in Proceedings of 8th International Conference on Mobile Data Management (MDM 2007), May 2007, pp. 67-79.
-
(2007)
Proceedings of 8th International Conference on Mobile Data Management (MDM 2007)
, pp. 67-79
-
-
Bettini, C.1
Mascetti, S.2
Wang, X.S.3
Jajodia, S.4
-
5
-
-
34547474184
-
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
-
November
-
C.-Y. Chow, M. F. Mokbel, and X. Liu, "A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services", in Proceedings of 14th ACM International Symposium on Advances in Geographic Information Systems (ACM-GIS'06), November 2006, pp. 171-178.
-
(2006)
Proceedings of 14th ACM International Symposium on Advances in Geographic Information Systems (ACM-GIS'06)
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
9
-
-
37849019629
-
Preserving Anonymity in Location Based Services
-
School of Computing, The National University of Singapore, Tech. Rep. TRB6/06
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. "Preserving Anonymity in Location Based Services", School of Computing, The National University of Singapore, Tech. Rep. TRB6/06, 2006.
-
(2006)
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
10
-
-
44649150419
-
AnonySense: Opportunistic and Privacy-Preserving Context Collection
-
May
-
A. Kapadia, N. Triandopoulos, C. Cornelius, D. Peebles, and D. Kotz, "AnonySense: Opportunistic and Privacy-Preserving Context Collection", in Proceedings of 6th International Conference on Pervasive Computing (Pervasive 2008), May 2008, pp. 280-297.
-
(2008)
Proceedings of 6th International Conference on Pervasive Computing (Pervasive 2008)
, pp. 280-297
-
-
Kapadia, A.1
Triandopoulos, N.2
Cornelius, C.3
Peebles, D.4
Kotz, D.5
-
12
-
-
34547720006
-
The New Casper: Query Processing for Location Services without Compromising Privacy
-
September
-
M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The New Casper: Query Processing for Location Services without Compromising Privacy", in Proceedings of 32nd International Conference on Very Large Data Bases (VLDB 2006), September 2006, pp. 763-774.
-
(2006)
Proceedings of 32nd International Conference on Very Large Data Bases (VLDB 2006)
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
13
-
-
51349116631
-
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment
-
April
-
H. Shin, V. Atluri, and J. Vaidya, "A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment", in Proceedings of 9th International Conference on Mobile Data Management (MDM 2008), April 2008, pp. 73-80.
-
(2008)
Proceedings of 9th International Conference on Mobile Data Management (MDM 2008)
, pp. 73-80
-
-
Shin, H.1
Atluri, V.2
Vaidya, J.3
-
16
-
-
33244463520
-
Privacy-Enhancing k-Anonymization of Customer Data
-
June
-
S. Zhong, Z. Yang, and R. N. Wright, "Privacy-Enhancing k-Anonymization of Customer Data", in Proceedings of 24th Symposium on Principles of Database Systems (PODS 2005), June 2005, pp. 139-147.
-
(2005)
Proceedings of 24th Symposium on Principles of Database Systems (PODS 2005)
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
-
17
-
-
2942524994
-
Location Privacy in Pervasive Computing
-
A. R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing", IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
18
-
-
35449007284
-
Preserving Location Privacy in Wireless LANs
-
June
-
T. Jiang, H. J. Wang, and Y.-C. Hu, "Preserving Location Privacy in Wireless LANs", in Proceedings of 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), June 2007, pp. 246-257.
-
(2007)
Proceedings of 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007)
, pp. 246-257
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.-C.3
-
19
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
August
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router", in Proceedings of 13th USENIX Security Symposium, August 2004, pp. 303-319.
-
(2004)
Proceedings of 13th USENIX Security Symposium
, pp. 303-319
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
20
-
-
70349241032
-
-
Centre for Applied Cryptographic Research, University of Waterloo, Tech. Rep. CACR, September, 2008
-
G. Zhong and U. Hengartner, "A Distributed k-Anonymity Protocol for Location Privacy", Centre for Applied Cryptographic Research, University of Waterloo, Tech. Rep. CACR 2008-17, September 2008.
-
(1917)
A Distributed k-Anonymity Protocol for Location Privacy
-
-
Zhong, G.1
Hengartner, U.2
-
21
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
May
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes", in Proceedings of EUROCRYPT '99, May 1999, pp. 223-238.
-
(1999)
Proceedings of EUROCRYPT '99
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
35048846561
-
Strong Conditional Oblivious Transfer and Computing on Intervals
-
December
-
I. F. Blake and V. Kolesnikov, "Strong Conditional Oblivious Transfer and Computing on Intervals", in Proceedings of ASIACRYPT 2004, December 2004, pp. 515-529.
-
(2004)
Proceedings of ASIACRYPT 2004
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
24
-
-
0001604533
-
Blind Signatures for Untraceable Payments
-
August
-
D. Chaum, "Blind Signatures for Untraceable Payments", in Proceedings of CRYPTO '82, August 1982, pp. 199-203.
-
(1982)
Proceedings of CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
25
-
-
24944435537
-
Compact E-Cash
-
May
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya, "Compact E-Cash", in Proceedings of EUROCRYPT 2005, May 2005, pp. 302-321.
-
(2005)
Proceedings of EUROCRYPT 2005
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
27
-
-
64549104317
-
Making P2P Accountable without Losing Privacy
-
October
-
M. Belenkiy, M. Chase, C. C. Erway, J. Janotti, A. Küpçü , A. Lysyanskaya, and E. Rachlin, "Making P2P Accountable without Losing Privacy", in Proceedings of 6th Workshop on Privacy in the Electronic Society (WPES 2007), October 2007, pp. 31-40.
-
(2007)
Proceedings of 6th Workshop on Privacy in the Electronic Society (WPES 2007)
, pp. 31-40
-
-
Belenkiy, M.1
Chase, M.2
Erway, C.C.3
Janotti, J.4
Küpçü, A.5
Lysyanskaya, A.6
Rachlin, E.7
-
28
-
-
57349110591
-
AnonySense: Privacy-Aware People-Centric Sensing
-
June
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, "AnonySense: Privacy-Aware People-Centric Sensing", in Proceedings of 6th International Conference on Mobile Systems, Applications, and Sendees (MobiSys 2008), June 2008, pp. 211-224.
-
(2008)
Proceedings of 6th International Conference on Mobile Systems, Applications, and Sendees (MobiSys 2008)
, pp. 211-224
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Triandopoulos, N.6
|