메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A distributed privacy-preserving scheme for location-based queries

Author keywords

[No Author keywords available]

Indexed keywords

ACCURATE LOCATION; CELLULAR OPERATORS; DISTRIBUTED SCHEMES; GENERIC APPROACH; LOCATION BASED; LOCATION DATA; LOCATION-BASED SERVICES; NETWORK OPERATOR; PRIVACY PRESERVING; TRAFFIC ANALYSIS; TRAFFIC MONITORING; UNTRACEABILITY;

EID: 77955903359     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WOWMOM.2010.5534928     Document Type: Conference Paper
Times cited : (11)

References (40)
  • 1
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design-principles of privacy-aware ubiquitous systems
    • Ubiquitous Computing - Ubicomp 2001, ser. Springer
    • M. Langheinrich, "Privacy by design-principles of privacy-aware ubiquitous systems," in Ubiquitous Computing - Ubicomp 2001, ser. Lecture Notes in Computer Science, vol. 2201. Springer, 2001, pp. 273-291.
    • (2001) Lecture Notes in Computer Science , vol.2201 , pp. 273-291
    • Langheinrich, M.1
  • 2
    • 33750243621 scopus 로고    scopus 로고
    • Location privacy and location-aware computing
    • J.Drummond, R. Billen, D. Forrest, and E. Joao, Eds. CRC Press
    • M. Duckham and L. Kulik, "Location privacy and location-aware computing," in Investigating Change in Space and Time, J.Drummond, R. Billen, D. Forrest, and E. Joao, Eds. CRC Press, 2006.
    • (2006) Investigating Change in Space and Time
    • Duckham, M.1    Kulik, L.2
  • 5
    • 2342562393 scopus 로고    scopus 로고
    • Protecting privacy, in continuous location-tracking applications
    • M. Gruteser and X. Liu, "Protecting privacy, in continuous location-tracking applications," IEEE Security & Privacy, vol. 2, no. 2, pp. 28-34, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.2 , pp. 28-34
    • Gruteser, M.1    Liu, X.2
  • 6
    • 77955907997 scopus 로고    scopus 로고
    • Privacy for real-time location-based services
    • L. Kulik, "Privacy for real-time location-based services," SIGSPATIAL Special, vol. 1, no. 2, pp. 9-14, 2009.
    • (2009) SIGSPATIAL Special , vol.1 , Issue.2 , pp. 9-14
    • Kulik, L.1
  • 7
    • 77951602707 scopus 로고    scopus 로고
    • Private Queries and Trajectory Anonymization: A Dual Perspective on Location Privacy
    • G. Ghinita, "Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy," Transactions on Data Privacy, vol. 2, no. 1, pp. 3-19, 2009.
    • (2009) Transactions on Data Privacy , vol.2 , Issue.1 , pp. 3-19
    • Ghinita, G.1
  • 8
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. Beresford and F. Stajano, "Location privacy in pervasive computing," Pervasive Computing, IEEE, vol. 2, no. 1, pp. 46-55, 2003.
    • (2003) Pervasive Computing, IEEE , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 10
    • 70349132053 scopus 로고    scopus 로고
    • Anonymity and historical-anonymity in location-based services
    • Privacy in Location Based Applications, ser. Springer Berlin / Heidelberg
    • C. Bettini, S. Mascetti, S. Wang, D. Freni, and S. Jajodia, "Anonymity and historical-anonymity in location-based services," in Privacy in Location Based Applications, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2009, vol. 5599, pp. 1-30.
    • (2009) Lecture Notes in Computer Science , vol.5599 , pp. 1-30
    • Bettini, C.1    Mascetti, S.2    Wang, S.3    Freni, D.4    Jajodia, S.5
  • 13
    • 37849043178 scopus 로고    scopus 로고
    • Privacy protection in location-based services through a public-key privacy homomorphism
    • Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, ser. Springer
    • A. Solanas and A. Martínez-Ballesté, "Privacy protection in location-based services through a public-key privacy homomorphism," in Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, ser. Lecture Notes in Computer Science, vol. 4582. Springer, 2007, pp. 362-368.
    • (2007) Lecture Notes in Computer Science , vol.4582 , pp. 362-368
    • Solanas, A.1    Martínez-Ballesté, A.2
  • 18
    • 40949126919 scopus 로고    scopus 로고
    • A TTP-free protocol for location privacy in location-based services
    • A. Solanas and A. Martínez-Ballesté, "A TTP-free protocol for location privacy in location-based services," Computer Communications, vol. 31, no. 6, pp. 1181-1191, 2008.
    • (2008) Computer Communications , vol.31 , Issue.6 , pp. 1181-1191
    • Solanas, A.1    Martínez-Ballesté, A.2
  • 19
    • 70349132697 scopus 로고    scopus 로고
    • Privacy preservation over untrusted mobile networks
    • Privacy in Location Based Applications, ser. Springer
    • C. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, "Privacy preservation over untrusted mobile networks," in Privacy in Location Based Applications, ser. Lecture Notes in Computer Science. Springer, 2009, vol. 5599, pp. 84-105.
    • (2009) Lecture Notes in Computer Science , vol.5599 , pp. 84-105
    • Ardagna, C.1    Jajodia, S.2    Samarati, P.3    Stavrou, A.4
  • 22
    • 69949127837 scopus 로고    scopus 로고
    • On the optimal placement of MIX zones
    • 9th International Symposium, Privacy Enhancing Technologies - PETS 2009, Seattle, WA, USA, August 5-7, 2009, ser. Springer
    • J. Freudiger, R. Shokri, and J. Hubeaux, "On the optimal placement of MIX zones," in 9th International Symposium, Privacy Enhancing Technologies - PETS 2009, Seattle, WA, USA, August 5-7, 2009, ser. Lecture Notes in Computer Science, vol. 5672. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5672
    • Freudiger, J.1    Shokri, R.2    Hubeaux, J.3
  • 24
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on discrete logarithms residues
    • Eurocrypt 99, ser. Springer-Verlag
    • P. Paillier, "Public-key cryptosystems based on discrete logarithms residues," in Eurocrypt 99, ser. LNCS, vol. 1592. Springer-Verlag, 1999, pp. 221-236.
    • (1999) LNCS , vol.1592 , pp. 221-236
    • Paillier, P.1
  • 25
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Third International Conference on Pervasive Computing - Pervasive 2005, ser. Springer
    • M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy," in Third International Conference on Pervasive Computing - Pervasive 2005, ser. Lecture Notes in Computer Science, vol. 3468. Springer, 2005, pp. 152-170.
    • (2005) Lecture Notes in Computer Science , vol.3468 , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 29
    • 0347380855 scopus 로고    scopus 로고
    • Wireless location privacy protection
    • B. Schilit, J. Hong, and M. Gruteser, "Wireless location privacy protection," IEEE Computer, pp. 135-137, 2003.
    • (2003) IEEE Computer , pp. 135-137
    • Schilit, B.1    Hong, J.2    Gruteser, M.3
  • 33
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald, "Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, 2005.
    • (2005) Mobile Networks and Applications , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 36
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE transactions on information theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 37
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • D. Chaum, R. Rivest, and A. Sherman, Eds.
    • D. Chaum, "Blind signatures for untraceable payments," in Advances in Cryptology - Proceedings of Crypto 82, D. Chaum, R. Rivest, and A. Sherman, Eds., 1983, pp. 199-203.
    • (1983) Advances in Cryptology - Proceedings of Crypto 82 , pp. 199-203
    • Chaum, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.