-
1
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with privacygrid
-
New York, NY, USA: ACM
-
B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting anonymous location queries in mobile environments with privacygrid," in WWW '08: Proceeding of the 17th international conference on World Wide Web. New York, NY, USA: ACM, 2008, pp. 237-246.
-
(2008)
WWW '08: Proceeding of the 17th International Conference on World Wide Web
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
2
-
-
2942524994
-
Location privacy in pervasive computing
-
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46- 55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
3
-
-
51349116601
-
Confidentiality protection for distributed sensor data aggregation
-
Phoenix AZ, USA, April
-
T. Feng, C. Wang, W. Zhang, and L. Ruan, "Confidentiality protection for distributed sensor data aggregation," in Proc. of IEEE INFOCOM'08, Phoenix AZ, USA, April 2008.
-
(2008)
Proc. of IEEE INFOCOM'08
-
-
Feng, T.1
Wang, C.2
Zhang, W.3
Ruan, L.4
-
4
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
5
-
-
34548301953
-
Pda: Privacy-preserving data aggregation in wireless sensor networks
-
May
-
W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "Pda: Privacy-preserving data aggregation in wireless sensor networks," in Proc. of IEEE INFOCOM'07, May 2007.
-
(2007)
Proc. of IEEE INFOCOM'07
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
6
-
-
33847315663
-
Protecting location privacy through path confusion
-
Washington, DC, USA
-
B. Hoh and M. Gruteser, "Protecting location privacy through path confusion," in Proc. of SecureComm '05, Washington, DC, USA, 2005, pp. 194-205.
-
(2005)
Proc. of SecureComm '05
, pp. 194-205
-
-
Hoh, B.1
Gruteser, M.2
-
7
-
-
57349108972
-
Preserving privacy in gps traces via uncertainty-aware path cloaking
-
NewYork, NY, USA: ACM
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security. NewYork, NY, USA: ACM, 2007, pp. 161-171.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 161-171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
8
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
May
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," in Proc. of IEEE INFOCOM'07, May 2007.
-
(2007)
Proc. of IEEE INFOCOM'07
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
9
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
Washington, DC, USA
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor network routing," in Proc. of IEEE ICDCS '05, Washington, DC, USA, 2005.
-
(2005)
Proc. of IEEE ICDCS '05
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
11
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and ?-diversity
-
[Online]. Available
-
N. Li and T. Li, "t-closeness: Privacy beyond k-anonymity and ?-diversity," in In Proceedings of IEEE International Conference on Data Engineering, 2007. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/ summary?doi=10.1.1.92.587.
-
(2007)
Proceedings of IEEE International Conference on Data Engineering
-
-
Li, N.1
Li, T.2
-
12
-
-
34147182909
-
Learning and inferring transportation routines
-
L. Liao, D. J. Patterson, D. Fox, and H. Kautz, "Learning and inferring transportation routines," Artif. Intell., vol. 171, no. 5-6, pp. 311-331, 2007.
-
(2007)
Artif. Intell.
, vol.171
, Issue.5-6
, pp. 311-331
-
-
Liao, L.1
Patterson, D.J.2
Fox, D.3
Kautz, H.4
-
14
-
-
33749607006
-
L-diversity: Privacy beyond kanonymity
-
[Online]. Available
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-diversity: Privacy beyond kanonymity," in 22nd IEEE International Conference on Data Engineering, 2006. [Online]. Available: http://www.cs.umass. edu/∼{}mhay/links.html.
-
(2006)
22nd IEEE International Conference on Data Engineering
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
15
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
Oct.
-
K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," in Proc. of IEEE ICNP '07, Oct. 2007.
-
(2007)
Proc. of IEEE ICNP '07
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
16
-
-
0242612015
-
Mobility modelling and trajectory prediction for cellular networks with mobile base stations
-
New York, NY, USA: ACM
-
P. N. Pathirana, A. V. Savkin, and S. Jha, "Mobility modelling and trajectory prediction for cellular networks with mobile base stations," in MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM, 2003, pp. 213- 221.
-
(2003)
MobiHoc '03: Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 213-221
-
-
Pathirana, P.N.1
Savkin, A.V.2
Jha, S.3
-
17
-
-
34548302064
-
Pdcs: Security and privacy support for data-centric sensor networks
-
May
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pdcs: Security and privacy support for data-centric sensor networks," in Proc. of IEEE INFOCOM '07, May 2007.
-
(2007)
Proc. of IEEE INFOCOM '07
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
18
-
-
51349098378
-
Verifiable privacy-preserving range query in two-tiered sensor networks
-
Phoenix AZ, USA, April
-
B. Sheng and Q. Li, "Verifiable privacy-preserving range query in two-tiered sensor networks," in Proc. of IEEE INFOCOM '08, Phoenix AZ, USA, April 2008.
-
(2008)
Proc. of IEEE INFOCOM '08
-
-
Sheng, B.1
Li, Q.2
-
19
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
June
-
H. Wang, B. Sheng, and Q. Li, "Privacy-aware routing in sensor networks," Computer Networks, vol. 53, no. 9, pp. 1512-1529, June 2008.
-
(2008)
Computer Networks
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
20
-
-
63149177578
-
Towards successive privacy protection in sensor networks
-
Washington, DC, USA: IEEE Computer Society
-
B. Zhao, D. Wang, Z. Shao, J. Cao, K. C. C. Chan, J. Su, and Y. Yang, "Towards successive privacy protection in sensor networks," in EUC '08: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Washington, DC, USA: IEEE Computer Society, 2008, pp. 167-172.
-
(2008)
EUC '08: Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
, pp. 167-172
-
-
Zhao, B.1
Wang, D.2
Shao, Z.3
Cao, J.4
Chan, K.C.C.5
Su, J.6
Yang, Y.7
-
21
-
-
77950246399
-
An optimal algorithm towards successive location privacy in sensor networks with dynamic programming
-
vol. E93.D
-
B. ZHAO, D. WANG, Z. SHAO, J. CAO, K. C. CHAN, and J. SU, "An optimal algorithm towards successive location privacy in sensor networks with dynamic programming," IEICE Transactions on Information and Systems, vol. E93.D, no. 3, pp. 531-533, 2010.
-
(2010)
IEICE Transactions on Information and Systems
, Issue.3
, pp. 531-533
-
-
Zhao, B.1
Wang, D.2
Shao, Z.3
Cao, J.4
Chan, K.C.5
Su, J.6
|