-
1
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
] M. Gruteser and D. Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," in Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, 2003, pp. 31-42.
-
(2003)
Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
2
-
-
70349522412
-
Query l-diversity in location-based services
-
F. Liu, K. A. Hua, and Y. Cai, "Query l-Diversity in Location-Based Services," in Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, pp. 436-442.
-
(2009)
Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware
, pp. 436-442
-
-
Liu, F.1
Hua, K.A.2
Cai, Y.3
-
3
-
-
33749607006
-
ℓ-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "ℓ-diversity: Privacy Beyond k-Anonymity," in Proceedings of the 22nd International Conference on Data Engineering, 2006, p. 24.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering
, pp. 24
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
4
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with privacy grid
-
B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid," in Proceedings of the 17th International World Wide Web Conference, 2008, pp. 237-246.
-
(2008)
Proceedings of the 17th International World Wide Web Conference
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
5
-
-
36549043405
-
Protecting location privacy with personalized κ-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting Location Privacy with Personalized κ-anonymity: Architecture and Algorithms," IEEE Transactions on Mobile Computing, vol.7, no.1, pp. 1-18, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
6
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Transactions on Knowledge and Data Engineering, vol.19, no.12, pp. 1719-1733, 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
7
-
-
2342562393
-
Protecting privacy in continuous location-tracking applications
-
M. Gruteser and X. Liu, "Protecting Privacy in Continuous Location-Tracking Applications," IEEE Security and Privacy, vol.2, no.2, pp. 28-34, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
9
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
C. Bettini, X. S. Wang, and S. Jajodia, "Protecting Privacy Against Location-Based Personal Identification," in Proceedings of the 2nd VLDB Workshop on Secure Data Management, 2005, pp. 185-199.
-
(2005)
Proceedings of the 2nd VLDB Workshop on Secure Data Management
, pp. 185-199
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
11
-
-
70349155338
-
ProvidentHider: An algorithm to preserve historical κ-anonymity in LBS
-
S. Mascetti, C. Bettini, X. S. Wang, D. Freni, and S. Jajodia, "ProvidentHider: An Algorithm to Preserve Historical κ-anonymity in LBS," in Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, pp. 172-181.
-
(2009)
Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware
, pp. 172-181
-
-
Mascetti, S.1
Bettini, C.2
Wang, X.S.3
Freni, D.4
Jajodia, S.5
-
14
-
-
34548805858
-
T-Closeness: Privacy beyond κ-anonymity and ℓ-diversity
-
N. Li, T. Li, and S. Venkatasubramaniam, "t-Closeness: Privacy Beyond κ-Anonymity and ℓ-diversity," in Proceedings of the 23rd International Conference on Data Engineering, 2007, pp. 106-115.
-
(2007)
Proceedings of the 23rd International Conference on Data Engineering
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramaniam, S.3
-
17
-
-
0030420818
-
Encoding and decoding the hilbert order
-
X. Liu and G. Schrack, "Encoding and Decoding the Hilbert Order," Software-Practice and Experience, vol.26, no.12, pp. 1335-1346, 1996.
-
(1996)
Software-Practice and Experience
, vol.26
, Issue.12
, pp. 1335-1346
-
-
Liu, X.1
Schrack, G.2
|