-
1
-
-
70349132053
-
Anonymity and historical-anonymity in location-based services
-
ser. LNCS
-
C. Bettini, S. Mascetti, X. S. Wang, D. Freni, and S. Jajodia, "Anonymity and historical-anonymity in location-based services," in Privacy in Location-Based Applications, ser. LNCS, vol. 5599, 2009, pp. 1-30.
-
(2009)
Privacy in Location-Based Applications
, vol.5599
, pp. 1-30
-
-
Bettini, C.1
Mascetti, S.2
Wang, X.S.3
Freni, D.4
Jajodia, S.5
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 4(2), pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
35248882142
-
Generalising mixes
-
ser. LNCS
-
C. Diáz and A. Serjantov, "Generalising mixes," in PET 2003, ser. LNCS, vol. 2760, pp. 18-31.
-
PET 2003
, vol.2760
, pp. 18-31
-
-
Diáz, C.1
Serjantov, A.2
-
4
-
-
38149088112
-
A fresh look at the generalised mix framework
-
ser. LNCS
-
A. Serjantov, "A fresh look at the generalised mix framework," in PET 2007, ser. LNCS, vol. 4776, pp. 17-29.
-
PET 2007
, vol.4776
, pp. 17-29
-
-
Serjantov, A.1
-
5
-
-
85084161366
-
Tor: The second-generation onion router
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," in 13th USENIX Security Symposium, 2004, pp. 303-320.
-
(2004)
13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
6
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
R. T. Morris, M. J. Freedman, and M. J. Freedman, "Tarzan: A peer-to-peer anonymizing network layer," in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), 2002, pp. 193-206.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002)
, pp. 193-206
-
-
Morris, R.T.1
Freedman, M.J.2
Freedman, M.J.3
-
7
-
-
38149139318
-
Browser-based attacks on Tor
-
ser. LNCS
-
T. G. Abbott, K. J. Lai, M. R. Lieberman, and E. C. Price, "Browser-based attacks on Tor," in PET 2007, ser. LNCS, vol. 4776, 2007, pp. 184-199.
-
(2007)
PET 2007
, vol.4776
, pp. 184-199
-
-
Abbott, T.G.1
Lai, K.J.2
Lieberman, M.R.3
Price, E.C.4
-
8
-
-
66549090154
-
Preserving user location privacy in mobile data management infrastructures
-
ser. LNCS
-
R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, "Preserving user location privacy in mobile data management infrastructures," in PET 2006, ser. LNCS, vol. 4258, pp. 393-412.
-
PET 2006
, vol.4258
, pp. 393-412
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
9
-
-
70349513937
-
Privacy-aware proximity based services
-
S. Mascetti, C. Bettini, D. Freni, X. Wang, and S. Jajodia, "Privacy-aware proximity based services," in 2009 International Conference on Mobile Data Management, 2009, pp. 1140-1143.
-
(2009)
2009 International Conference on Mobile Data Management
, pp. 1140-1143
-
-
Mascetti, S.1
Bettini, C.2
Freni, D.3
Wang, X.4
Jajodia, S.5
-
10
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser, D. Grunwalddepartment, and C. Science, "Anonymous usage of location-based services through spatial and temporal cloaking," in the 1st international conference on Mobile systems, applications and services (USENIX MobiSys), 2003, pp. 31-42.
-
(2003)
The 1st International Conference on Mobile Systems, Applications and Services (USENIX MobiSys)
, pp. 31-42
-
-
Gruteser, M.1
Grunwalddepartment, D.2
Science, C.3
-
11
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries," IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719-1733, 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
12
-
-
33745725717
-
An anonymous communication technique using dummies for location-based services
-
DOI 10.1109/PERSER.2005.1506394, 1506394, Proceedings - International Conference on Pervasive Services, ICPS '05
-
H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in IEEE International Conference on Pervasive Services (ICPS), 2005, pp. 88-97. (Pubitemid 43996462)
-
(2005)
Proceedings - International Conference on Pervasive Services, ICPS '05
, vol.2005
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
13
-
-
70349144789
-
Pad: Privacy-area aware, dummy-based location privacy in mobile services
-
H. Lu, C. Jensen, and M. Yiu, "Pad: Privacy-area aware, dummy-based location privacy in mobile services," in MobiDE, 2008, pp. 16-23.
-
(2008)
MobiDE
, pp. 16-23
-
-
Lu, H.1
Jensen, C.2
Yiu, M.3
-
14
-
-
77952388157
-
Binomial-mixbased location anonymizer system with global dummy generation to preserve user location privacy in location-based services
-
M.-T. Tran, I. Echizen, and A.-D. Duong, "Binomial-mixbased location anonymizer system with global dummy generation to preserve user location privacy in location-based services," in Proceedings of the Fifth International Conference on Availability, Reliability and Security ARES 2010, 2010, pp. 580-585.
-
(2010)
Proceedings of the Fifth International Conference on Availability, Reliability and Security ARES 2010
, pp. 580-585
-
-
Tran, M.-T.1
Echizen, I.2
Duong, A.-D.3
-
15
-
-
74249094214
-
RPROB - A family of binomial-mix-based anonymous communication systems
-
M. T. Tran, A. D. Duong, and I. Echizen, "RPROB - a family of binomial-mix-based anonymous communication systems," in 2009 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-09), 2009, pp. 765-770.
-
(2009)
2009 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-09)
, pp. 765-770
-
-
Tran, M.T.1
Duong, A.D.2
Echizen, I.3
-
16
-
-
33646156642
-
Simulation of obfuscation and negotiation for location privacy
-
ser. LNCS
-
M. Duckham and L. Kulik, "Simulation of obfuscation and negotiation for location privacy," in COSIT 2005, ser. LNCS, vol. 3693, 2005, pp. 31-48.
-
(2005)
COSIT 2005
, vol.3693
, pp. 31-48
-
-
Duckham, M.1
Kulik, L.2
-
17
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
ser. LNCS
-
M.Duckham and L.Kulik, "A formal model of obfuscation and negotiation for location privacy," in PERVASIVE 2005, ser. LNCS, vol. 3468, 2005, pp. 152-170.
-
(2005)
PERVASIVE 2005
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
19
-
-
24344501784
-
Measuring anonymity in a nonadaptive real-time system
-
ser. LNCS
-
G. Tóth and Z. Hornák, "Measuring anonymity in a nonadaptive real-time system," in 4th Privacy Enhancing Technologies Symposium (PET 2004), ser. LNCS, vol. 3424, 2004, pp. 226-241.
-
(2004)
4th Privacy Enhancing Technologies Symposium (PET 2004)
, vol.3424
, pp. 226-241
-
-
Tóth, G.1
Hornák, Z.2
-
20
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a Type III Anonymous Remailer Protocol," in Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 2-15.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
|