메뉴 건너뛰기




Volumn , Issue , 2009, Pages

An Efficient K-anonymous Localization technique for assistive environments

Author keywords

Assistive environments; Location tracking; Privacy

Indexed keywords

ASSISTANCE STRATEGY; ASSISTIVE; K-ANONYMITY; LOCALIZATION TECHNIQUE; LOCATION TRACKING; WIRELESS DEVICES;

EID: 70450278994     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1579114.1579116     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 1
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 5
    • 12244291938 scopus 로고    scopus 로고
    • An improvement of the yang-shieh password authentication schemes
    • R. C. W. C. C. Yang and T. Y. Chang. An improvement of the yang-shieh password authentication schemes. Applied Mathematics and Computation, 162:1391U-1396U, 2005.
    • (2005) Applied Mathematics and Computation , vol.162
    • Yang, R.C.W.C.C.1    Chang., T.Y.2
  • 7
    • 70450227100 scopus 로고    scopus 로고
    • F Classes and E. M. For deterministic random Number Generators
    • 2 December
    • F. Classes and E. M. for Deterministic Random Number Generators (AIS 20, Version 2.0, 2 December 1999). http://www.bsi.de/zertifiz/zert/interpr/ais20e. pdf.
    • (1999) AIS 20, Version 2.0
  • 10
    • 52149112467 scopus 로고
    • A table driven approach to cyclic redundancy check calculations
    • J. R. Hill. A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40-60, 1979.
    • (1979) SIGCOMM Comput. Commun. Rev. , vol.9 , Issue.2 , pp. 40-60
    • Hill, J.R.1
  • 11
    • 23844515436 scopus 로고    scopus 로고
    • Random-data perturbation techniques and privacy-preserving data mining
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst., 7(4):387-414, 2005.
    • (2005) Knowl. Inf. Syst. , vol.7 , Issue.4 , pp. 387-414
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar., K.4
  • 13
    • 4043060141 scopus 로고    scopus 로고
    • New remote user authentication scheme using smart cards
    • M. Kumar. New remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic, 50(2):597-600, 2004.
    • (2004) IEEE Trans. Consumer Electronic , vol.50 , Issue.2 , pp. 597-600
    • Kumar, M.1
  • 14
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, Nov. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport., L.1
  • 16
    • 27644489837 scopus 로고    scopus 로고
    • Securing credit card transactions with one-time payment scheme
    • Y. Li and X. Zhang. Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications, 4:413-426, 2005.
    • (2005) Electronic Commerce Research and Applications , vol.4 , pp. 413-426
    • Li, Y.1    Zhang, X.2
  • 18
    • 33144456748 scopus 로고    scopus 로고
    • Secure remote user access over insecure networks
    • M. Peyravian and C. Jeffries. Secure remote user access over insecure networks. Computer Communications, 29(5):660-667, 2006.
    • Computer Communications , vol.29 , Issue.5 , pp. 660-667
    • Peyravian, M.1    Jeffries., C.2
  • 21
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati. Protecting respondents' identities in microdata release. IEEE Trans. on Knowl. and Data Eng., 13(6):1010-1027, 2001.
    • (2001) IEEE Trans. on Knowl. and Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 23
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol (wep)
    • A. Stubblefield, J. Ioannidis, and A. D. Rubin. A key recovery attack on the 802.11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur., 7(2):319-332, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.2 , pp. 319-332
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.