-
1
-
-
1642286258
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of USENIX MobiSys. (2003)
-
(2003)
Proc. of USENIX MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
2
-
-
27944454864
-
Location Privacy in Mobile Systems: A Personalized Anonymization Model
-
Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: Proc. of ICDCS, pp. 620-629 (2005)
-
(2005)
Proc. of ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
3
-
-
34547720006
-
The New Casper: Query Processing for Location Services without Compromising Privacy
-
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB (2006)
-
(2006)
Proc. of VLDB
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
4
-
-
35648982949
-
Preserving Location-based Identity Inference in Anonymous Spatial Queries
-
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Location-based Identity Inference in Anonymous Spatial Queries. IEEE TKDE 19(12) (2007)
-
(2007)
IEEE TKDE
, vol.19
, Issue.12
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
5
-
-
57149129292
-
-
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private Queries in Location Based Services: Anonymizers are not Necessary. In: SIGMOD (2008)
-
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private Queries in Location Based Services: Anonymizers are not Necessary. In: SIGMOD (2008)
-
-
-
-
6
-
-
33745725717
-
An anonymous communication technique using dummies for location-based services
-
ICPS, pp
-
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: International Conference on Pervasive Services (ICPS), pp. 88-97 (2005)
-
(2005)
International Conference on Pervasive Services
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
7
-
-
52649118020
-
SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
-
Yiu, M.L., Jensen, C., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: International Conference on Data Engineering (ICDE), pp. 366-375 (2008)
-
(2008)
International Conference on Data Engineering (ICDE)
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.2
Huang, X.3
Lu, H.4
-
8
-
-
66549090154
-
-
Cheng, R., Zhang, Y., Bertino, E., Prahbakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 393-412. Springer, Heidelberg (2006)
-
Cheng, R., Zhang, Y., Bertino, E., Prahbakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393-412. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
37849011436
-
-
Chow, C.Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, 4605, pp. 258-275. Springer, Heidelberg (2007)
-
Chow, C.Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258-275. Springer, Heidelberg (2007)
-
-
-
-
10
-
-
2342562393
-
Protecting Privacy in Continuous Location-Tracking Applications
-
Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy 2, 28-34 (2004)
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
11
-
-
70349106534
-
PROBE: An Obfuscation System for the Protection of Sensitive Location Information in LBS
-
Technical Report 2001-145, CERIAS
-
Damiani, M., Bertino, E., Silvestri, C.: PROBE: an Obfuscation System for the Protection of Sensitive Location Information in LBS. Technical Report 2001-145, CERIAS (2008)
-
(2008)
-
-
Damiani, M.1
Bertino, E.2
Silvestri, C.3
-
12
-
-
37849018331
-
-
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, 4605, pp. 239-257. Springer, Heidelberg (2007)
-
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239-257. Springer, Heidelberg (2007)
-
-
-
-
13
-
-
0029541045
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: IEEE Symposium on Foundations of Computer Science (1995)
-
(1995)
IEEE Symposium on Foundations of Computer Science
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
16
-
-
84958035648
-
-
Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, 2125, pp. 165-179. Springer, Heidelberg (2001)
-
Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165-179. Springer, Heidelberg (2001)
-
-
-
-
17
-
-
33847075772
-
Secure two-party point-circle inclusion problem
-
Luo, Y., Huang, L., Zhong, H.: Secure two-party point-circle inclusion problem. J. of Computer Science and Technology 22(1), 88-91 (2007)
-
(2007)
J. of Computer Science and Technology
, vol.22
, Issue.1
, pp. 88-91
-
-
Luo, Y.1
Huang, L.2
Zhong, H.3
-
18
-
-
0023545076
-
How to play any mental game
-
STOC, pp
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of ACM Symposium on Theory of Computing (STOC), pp. 218-229 (1987)
-
(1987)
Proceedings of ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
34547474184
-
-
GIS, pp
-
Chow, C.Y., Mokbel, M.F., Liu, X.: A Peer-to-peer Spatial Cloaking Algorithm for Anonymous Location-based Service. In: GIS, pp. 171-178 (2006)
-
(2006)
A Peer-to-peer Spatial Cloaking Algorithm for Anonymous Location-based Service
, pp. 171-178
-
-
Chow, C.Y.1
Mokbel, M.F.2
Liu, X.3
-
20
-
-
35348924316
-
-
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems. In: WWW (2007)
-
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems. In: WWW (2007)
-
-
-
-
21
-
-
37849047285
-
-
Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: A Mobile Peer-to-peer System for Anonymous Location-based Queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, 4605, pp. 221-238. Springer, Heidelberg (2007)
-
Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: A Mobile Peer-to-peer System for Anonymous Location-based Queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221-238. Springer, Heidelberg (2007)
-
-
-
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
24
-
-
0003772933
-
-
2nd edn. Springer, Heidelberg
-
de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry: Algorithms and Applications, 2nd edn. Springer, Heidelberg (2000)
-
(2000)
Computational Geometry: Algorithms and Applications
-
-
de Berg, M.1
van Kreveld, M.2
Overmars, M.3
Schwarzkopf, O.4
|