-
1
-
-
84945556728
-
Privacy by design-principles of privacy-aware ubiquitous systems
-
Ubiquitous Computing - Ubicomp 2001, ser. Springer
-
M. Langheinrich, "Privacy by design-principles of privacy-aware ubiquitous systems," in Ubiquitous Computing - Ubicomp 2001, ser. Lecture Notes in Computer Science, vol. 2201. Springer, 2001, pp. 273-291.
-
(2001)
Lecture Notes in Computer Science
, vol.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
2
-
-
33750243621
-
Location privacy and location-aware computing
-
J.Drummond, R. Billen, D. Forrest, and E. Joao, Eds. CRC Press
-
M. Duckham and L. Kulik, "Location privacy and location-aware computing," in Investigating Change in Space and Time, J.Drummond, R. Billen, D. Forrest, and E. Joao, Eds. CRC Press, 2006.
-
(2006)
Investigating Change in Space and Time
-
-
Duckham, M.1
Kulik, L.2
-
3
-
-
77949994882
-
Privacy-enhanced location-based access control
-
M. Gertz and S. Jajodia, Eds. Springer-Verlag
-
C. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, "Privacy-enhanced location-based access control," in The Handbook of Database Security: Applications and Trends, M. Gertz and S. Jajodia, Eds. Springer-Verlag, 2007.
-
(2007)
The Handbook of Database Security: Applications and Trends
-
-
Ardagna, C.1
Cremonini, M.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
5
-
-
2342562393
-
Protecting privacy, in continuous location-tracking applications
-
M. Gruteser and X. Liu, "Protecting privacy, in continuous location-tracking applications," IEEE Security & Privacy, vol. 2, no. 2, pp. 28-34, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
6
-
-
77955907997
-
Privacy for real-time location-based services
-
L. Kulik, "Privacy for real-time location-based services," SIGSPATIAL Special, vol. 1, no. 2, pp. 9-14, 2009.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 9-14
-
-
Kulik, L.1
-
7
-
-
77951602707
-
Private Queries and Trajectory Anonymization: A Dual Perspective on Location Privacy
-
G. Ghinita, "Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy," Transactions on Data Privacy, vol. 2, no. 1, pp. 3-19, 2009.
-
(2009)
Transactions on Data Privacy
, vol.2
, Issue.1
, pp. 3-19
-
-
Ghinita, G.1
-
8
-
-
2942524994
-
Location privacy in pervasive computing
-
A. Beresford and F. Stajano, "Location privacy in pervasive computing," Pervasive Computing, IEEE, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
Pervasive Computing, IEEE
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
9
-
-
84898788360
-
Path privacy in location-aware computing
-
M. Gruteser, J. Bredin, and D. Grunwald, "Path privacy in location-aware computing," in Proceedings of MobiSys 2004, Workshop on Context Awareness, 2004.
-
Proceedings of MobiSys 2004, Workshop on Context Awareness, 2004
-
-
Gruteser, M.1
Bredin, J.2
Grunwald, D.3
-
10
-
-
70349132053
-
Anonymity and historical-anonymity in location-based services
-
Privacy in Location Based Applications, ser. Springer Berlin / Heidelberg
-
C. Bettini, S. Mascetti, S. Wang, D. Freni, and S. Jajodia, "Anonymity and historical-anonymity in location-based services," in Privacy in Location Based Applications, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2009, vol. 5599, pp. 1-30.
-
(2009)
Lecture Notes in Computer Science
, vol.5599
, pp. 1-30
-
-
Bettini, C.1
Mascetti, S.2
Wang, S.3
Freni, D.4
Jajodia, S.5
-
11
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudonymity - a proposal for terminology," in Workshop on Design Issues in Anonymity and Unobservability, 2000, pp. 1-9.
-
Workshop on Design Issues in Anonymity and Unobservability, 2000
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
12
-
-
34547474184
-
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
-
ACM
-
C. Chow, M. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based service," in Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. ACM, 2006, p. 178.
-
(2006)
Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems
, pp. 178
-
-
Chow, C.1
Mokbel, M.2
Liu, X.3
-
13
-
-
37849043178
-
Privacy protection in location-based services through a public-key privacy homomorphism
-
Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, ser. Springer
-
A. Solanas and A. Martínez-Ballesté, "Privacy protection in location-based services through a public-key privacy homomorphism," in Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, ser. Lecture Notes in Computer Science, vol. 4582. Springer, 2007, pp. 362-368.
-
(2007)
Lecture Notes in Computer Science
, vol.4582
, pp. 362-368
-
-
Solanas, A.1
Martínez-Ballesté, A.2
-
14
-
-
35348924316
-
Prive: Anonymous location-based queries in distributed mobile systems
-
ACM
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Prive: anonymous location-based queries in distributed mobile systems," in Proceedings of the 16th international conference on World Wide Web. ACM, 2007, p. 380.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 380
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
15
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
New York, NY, USA: ACM
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, "Private queries in location based services: anonymizers are not necessary," in SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data. New York, NY, USA: ACM, 2008, pp. 121-132.
-
(2008)
SIGMOD '08: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.5
-
16
-
-
70349249349
-
Toward a distributed k-anonymity protocol for location privacy
-
New York, NY, USA: ACM
-
G. Zhong and U. Hengartner, "Toward a distributed k-anonymity protocol for location privacy," in WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society. New York, NY, USA: ACM, 2008, pp. 33-38.
-
(2008)
WPES '08: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society
, pp. 33-38
-
-
Zhong, G.1
Hengartner, U.2
-
18
-
-
40949126919
-
A TTP-free protocol for location privacy in location-based services
-
A. Solanas and A. Martínez-Ballesté, "A TTP-free protocol for location privacy in location-based services," Computer Communications, vol. 31, no. 6, pp. 1181-1191, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.6
, pp. 1181-1191
-
-
Solanas, A.1
Martínez-Ballesté, A.2
-
19
-
-
70349132697
-
Privacy preservation over untrusted mobile networks
-
Privacy in Location Based Applications, ser. Springer
-
C. Ardagna, S. Jajodia, P. Samarati, and A. Stavrou, "Privacy preservation over untrusted mobile networks," in Privacy in Location Based Applications, ser. Lecture Notes in Computer Science. Springer, 2009, vol. 5599, pp. 84-105.
-
(2009)
Lecture Notes in Computer Science
, vol.5599
, pp. 84-105
-
-
Ardagna, C.1
Jajodia, S.2
Samarati, P.3
Stavrou, A.4
-
21
-
-
38149010558
-
On the effectiveness of changing pseudonyms to provide location privacy in vanets
-
L. Buttyán, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in vanets," in Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS2007), 2007, pp. 129-141.
-
Proceedings of the Fourth European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS2007), 2007
, pp. 129-141
-
-
Buttyán, L.1
Holczer, T.2
Vajda, I.3
-
22
-
-
69949127837
-
On the optimal placement of MIX zones
-
9th International Symposium, Privacy Enhancing Technologies - PETS 2009, Seattle, WA, USA, August 5-7, 2009, ser. Springer
-
J. Freudiger, R. Shokri, and J. Hubeaux, "On the optimal placement of MIX zones," in 9th International Symposium, Privacy Enhancing Technologies - PETS 2009, Seattle, WA, USA, August 5-7, 2009, ser. Lecture Notes in Computer Science, vol. 5672. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5672
-
-
Freudiger, J.1
Shokri, R.2
Hubeaux, J.3
-
23
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information (abstract)
-
New York, NY, USA: ACM
-
P. Samarati and L. Sweeney, "Generalizing data to provide anonymity when disclosing information (abstract)," in PODS '98: Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems. New York, NY, USA: ACM, 1998, p. 188.
-
(1998)
PODS '98: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
24
-
-
0000277371
-
Public-key cryptosystems based on discrete logarithms residues
-
Eurocrypt 99, ser. Springer-Verlag
-
P. Paillier, "Public-key cryptosystems based on discrete logarithms residues," in Eurocrypt 99, ser. LNCS, vol. 1592. Springer-Verlag, 1999, pp. 221-236.
-
(1999)
LNCS
, vol.1592
, pp. 221-236
-
-
Paillier, P.1
-
25
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Third International Conference on Pervasive Computing - Pervasive 2005, ser. Springer
-
M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy," in Third International Conference on Pervasive Computing - Pervasive 2005, ser. Lecture Notes in Computer Science, vol. 3468. Springer, 2005, pp. 152-170.
-
(2005)
Lecture Notes in Computer Science
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
26
-
-
77952283522
-
Location Privacy in Moving-Object Environments
-
D. Lin, E. Bertino, R. Cheng, and S. Prabhakar, "Location Privacy in Moving-Object Environments," Transactions on Data Privacy, vol. 2, no. 1, pp. 21-46, 2009.
-
(2009)
Transactions on Data Privacy
, vol.2
, Issue.1
, pp. 21-46
-
-
Lin, D.1
Bertino, E.2
Cheng, R.3
Prabhakar, S.4
-
27
-
-
0029541045
-
Private information retrieval
-
IEEE Computer Society
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private information retrieval," in Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society, 1995, pp. 41-50.
-
(1995)
Annual IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
28
-
-
77949646207
-
-
Centre for Applied Cryptographic Research, University of Waterloo, Tech. Rep. CACR Tech Report 2009-22
-
F. Olumofin, P. Tysowski, and I. Goldberg, "Achieving efficient query privacy for location based services," Centre for Applied Cryptographic Research, University of Waterloo, Tech. Rep. CACR Tech Report 2009-22, 2009.
-
(2009)
Achieving Efficient Query Privacy for Location Based Services
-
-
Olumofin, F.1
Tysowski, P.2
Goldberg, I.3
-
29
-
-
0347380855
-
Wireless location privacy protection
-
B. Schilit, J. Hong, and M. Gruteser, "Wireless location privacy protection," IEEE Computer, pp. 135-137, 2003.
-
(2003)
IEEE Computer
, pp. 135-137
-
-
Schilit, B.1
Hong, J.2
Gruteser, M.3
-
30
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in IEEE Wireless Communications and Networking Conference (WCNC 2005), IEEE Computer Society Press, Los Alamitos, 2005.
-
IEEE Wireless Communications and Networking Conference (WCNC 2005), IEEE Computer Society Press, Los Alamitos, 2005
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
31
-
-
57349108972
-
Preserving privacy in GPS traces via uncertainty-aware path cloaking
-
ACM
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in GPS traces via uncertainty-aware path cloaking," in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, p. 171.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
33
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald, "Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, 2005.
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
34
-
-
38049060730
-
Spatio-temporal aggregations in trajectory data warehouses
-
S. Orlando, R. Orsini, A. Raffaeta, A. Roncato, and C. Silvestri, "Spatio-temporal aggregations in trajectory data warehouses," in Proceedings of Data Warehousing and Knowledge Discovery, 9th International Conference,.
-
Proceedings of Data Warehousing and Knowledge Discovery, 9th International Conference
-
-
Orlando, S.1
Orsini, R.2
Raffaeta, A.3
Roncato, A.4
Silvestri, C.5
-
36
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE transactions on information theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
37
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R. Rivest, and A. Sherman, Eds.
-
D. Chaum, "Blind signatures for untraceable payments," in Advances in Cryptology - Proceedings of Crypto 82, D. Chaum, R. Rivest, and A. Sherman, Eds., 1983, pp. 199-203.
-
(1983)
Advances in Cryptology - Proceedings of Crypto 82
, pp. 199-203
-
-
Chaum, D.1
-
38
-
-
50249107905
-
VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol
-
P. Cencioni and R. Di Pietro, "VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol," in IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007. MASS 2007, 2007, pp. 1-6.
-
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007. MASS 2007, 2007
, pp. 1-6
-
-
Cencioni, P.1
Di Pietro, R.2
-
40
-
-
58349109213
-
Pseudonym management using mediated identity-based cryptography
-
ACM
-
T. Candebat, C. Dunne, and D. Gray, "Pseudonym management using mediated identity-based cryptography," in Proceedings of the 2005 workshop on Digital identity management. ACM, 2005, p. 10.
-
(2005)
Proceedings of the 2005 Workshop on Digital Identity Management
, pp. 10
-
-
Candebat, T.1
Dunne, C.2
Gray, D.3
|