-
1
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with PrivacyGrid
-
B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with PrivacyGrid. In Proc. WWW, 2008.
-
(2008)
Proc. WWW
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
3
-
-
70450185494
-
Swarmscreen: Privacy through plausible deniability in p2p systems
-
D. Choffnes, J. Duch, D. Malmgren, R. Guierma, F. Bustamante, and L. Amaral. Swarmscreen: Privacy through plausible deniability in p2p systems. In Northwestern EECS Technical Report, 2009.
-
(2009)
Northwestern EECS Technical Report
-
-
Choffnes, D.1
Duch, J.2
Malmgren, D.3
Guierma, R.4
Bustamante, F.5
Amaral, L.6
-
4
-
-
57149132621
-
Enabling private continuous queries for revealed user locations
-
Advances in Spatial and Temporal Databases
-
C.-Y. Chow and M. F. Mokbel. Enabling private continuous queries for revealed user locations. In Proc. SSTD'07: Advances in Spatial and Temporal Databases, 2007.
-
(2007)
Proc. SSTD'07
-
-
Chow, C.-Y.1
Mokbel, M.F.2
-
6
-
-
84886393009
-
N-Variant systems: A secretless framework for security through diversity
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, j. Davidson, J. Knight, A. Nguyen-Tuongand J. Hiser. N-Variant systems: A secretless framework for security through diversity. In Proc. USENIX Security Symposium, 2006.
-
(2006)
Proc. USENIX Security Symposium
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
8
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In Proc. Pervasive, pp. 152-170, 2005.
-
(2005)
Proc. Pervasive
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
9
-
-
50249086141
-
Differential privacy
-
Intl. Colloquium on Automata, Languages and Programming
-
C. Dwork. Differential privacy. In Proc. ICALP'06: Intl. Colloquium on Automata, Languages and Programming, 2006.
-
(2006)
Proc. ICALP'06
-
-
Dwork, C.1
-
12
-
-
0016353777
-
Quad trees: A data structure for retrieval on composite keys
-
R. Finkel and J. Bentley. Quad trees: A data structure for retrieval on composite keys. Acta Informatica, 4(1):1-9, 1974.
-
(1974)
Acta Informatica
, vol.4
, Issue.1
, pp. 1-9
-
-
Finkel, R.1
Bentley, J.2
-
13
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proc. ICDCS, 2005.
-
(2005)
Proc. ICDCS
-
-
Gedik, B.1
Liu, L.2
-
14
-
-
51849113964
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 2007.
-
(2007)
IEEE Transactions on Mobile Computing
-
-
Gedik, B.1
Liu, L.2
-
15
-
-
57149129292
-
Private queries in location-based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location-based services: Anonymizers are not necessary. In Proc. ACM SIGMOD, 2008.
-
(2008)
Proc. ACM SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
17
-
-
35348924316
-
PRIVE: Anonymous location-based queries in distributed mobile systems
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: Anonymous location-based queries in distributed mobile systems. In Proc. WWW, 2007.
-
(2007)
In Proc. WWW
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
19
-
-
1642286258
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. Mobisys, 2003.
-
(2003)
Proc. Mobisys
-
-
Gruteser, M.1
Grunwald, D.2
-
21
-
-
33947121654
-
Protection of location privacy using dummies for location-based services
-
K. H, Y. Yanagisawa, and T. Satoh. Protection of location privacy using dummies for location-based services. In Proc ICDE Workshops, 2005.
-
(2005)
Proc ICDE Workshops
-
-
Yanagisawa K.H, Y.1
Satoh, T.2
-
23
-
-
34848925631
-
Location privacy through path confusion
-
B. Hoh and M. Gruteser. Location privacy through path confusion. In Proc. SecureComm, 2005.
-
(2005)
Proc. SecureComm
-
-
Hoh, B.1
Gruteser, M.2
-
25
-
-
67650650201
-
Realtime location privacy via mobility prediction: Creating confusion at crossroads
-
R. R. C. J. Meyerowitz. Realtime location privacy via mobility prediction: Creating confusion at crossroads. In Proc. HotMobile, 2009.
-
(2009)
Proc. HotMobile
-
-
Meyerowitz, R.R.C.J.1
-
26
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719-1733, 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
27
-
-
84872775433
-
Realistic driving trips for location privacy
-
J. Krumm. Realistic driving trips for location privacy. In Proc. Pervasive, 2009.
-
(2009)
Proc. Pervasive
-
-
Krumm, J.1
-
28
-
-
34247849441
-
Predestination: Where do you want to go today?
-
J. Krumm and E. Horvitz. Predestination: Where do you want to go today? In IEEE Computer Magazine, vol. 40, no. 4, pp. 105-107, 2007.
-
(2007)
IEEE Computer Magazine
, vol.40
, Issue.4
, pp. 105-107
-
-
Krumm, J.1
Horvitz, E.2
-
31
-
-
52649118020
-
Spacetwist: Managing the tradeoffs among location privacy, query performance, and query accuracy in mobile services
-
M. L. Liu, C. S. Jensen, X. Huang, and H. Lu. Spacetwist: Managing the tradeoffs among location privacy, query performance, and query accuracy in mobile services. In Proc ICDE, 2008.
-
(2008)
Proc ICDE
-
-
Liu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
-
33
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. In Proc. ICDE, 2008.
-
(2008)
Proc. ICDE
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.3
Gehrke, J.4
Vilhuber, L.5
-
34
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new Casper: Query processing for location services without compromising privacy. In Proc. VLDB, 2006.
-
(2006)
Proc. VLDB
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
41
-
-
85141026002
-
On the computational practicality of private information retrieval
-
R. Sion and B. Carbunar. On the computational practicality of private information retrieval. In Proc. NDSS, 2007.
-
(2007)
Proc. NDSS
-
-
Sion, R.1
Carbunar, B.2
-
44
-
-
47749116361
-
-
Yahoo! Local. http://traffic.yahoo.com/traffic/.
-
Yahoo! Local
-
-
-
45
-
-
70349306591
-
A distributed k-anonymity protocol for location privacy
-
G. Zhong and U. Hengartner. A distributed k-anonymity protocol for location privacy. In Proc. IEEE PerCom, 2009.
-
(2009)
Proc. IEEE PerCom
-
-
Zhong, G.1
Hengartner, U.2
|