메뉴 건너뛰기




Volumn , Issue , 2010, Pages 185-196

Privacy vulnerability of published anonymous mobility traces

Author keywords

Entropy; Location privacy

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SCIENCE; ENTROPY;

EID: 78649253198     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1859995.1860017     Document Type: Conference Paper
Times cited : (81)

References (24)
  • 1
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • R. Agrawal and R. Srikant. Privacy-preserving data mining. SIGMOD Rec., 29(2), 2000.
    • (2000) SIGMOD Rec. , vol.29 , Issue.2
    • Agrawal, R.1    Srikant, R.2
  • 2
    • 78649284130 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • Tokyo, Japan, April
    • R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In IEEE ICDE, Tokyo, Japan, April 2005.
    • (2005) IEEE ICDE
    • Bayardo, R.J.1    Agrawal, R.2
  • 4
    • 78649292377 scopus 로고    scopus 로고
    • Online
    • Dartmouth College. CRAWDAD. Online http://crawdad.cs.dartmouth.edu/.
    • CRAWDAD
  • 5
    • 57349124799 scopus 로고    scopus 로고
    • The pothole patrol: Using a mobile sensor network for road surface monitoring
    • Breckenridge, CO, June
    • J. Eriksson, L. Girod, B. Hull, R. Newton, S. Madden, and H. Balakrishnan. The pothole patrol: Using a mobile sensor network for road surface monitoring. In ACM MobiSys, Breckenridge, CO, June 2008.
    • (2008) ACM MobiSys
    • Eriksson, J.1    Girod, L.2    Hull, B.3    Newton, R.4    Madden, S.5    Balakrishnan, H.6
  • 7
    • 78649299876 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • Columbus, OH, June
    • B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In IEEE ICDCS, Columbus, OH, June 2005.
    • (2005) IEEE ICDCS
    • Gedik, B.1    Liu, L.2
  • 8
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • San Francisco, CA, May
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, San Francisco, CA, May 2003.
    • (2003) ACM MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 10
    • 57349108972 scopus 로고    scopus 로고
    • Preserving privacy in gps traces via uncertainty-aware path cloaking
    • Alexandria, VA, October
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in gps traces via uncertainty-aware path cloaking. In ACM CCS, Alexandria, VA, October 2007.
    • (2007) ACM CCS
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 11
    • 32144451875 scopus 로고    scopus 로고
    • Model T: An empirical model for user registration patterns in a campus wireless LAN
    • Cologne Germany, August
    • R. Jain, D. Lelescu, and M. Balakrishnan. Model T: An Empirical Model for User Registration Patterns in a Campus Wireless LAN. In ACM MobiCom, Cologne Germany, August 2005.
    • (2005) ACM MobiCom
    • Jain, R.1    Lelescu, D.2    Balakrishnan, M.3
  • 12
    • 37749052702 scopus 로고    scopus 로고
    • Power law and exponential decay of inter contact times between mobile devices
    • Montreal, Quebec, Canada, September
    • T. Karagiannis, J.-Y. L. Boudec, and M. Vojnovic. Power Law and Exponential Decay of Inter Contact Times between Mobile Devices. In ACM MobiCom, Montreal, Quebec, Canada, September 2007.
    • (2007) ACM MobiCom
    • Karagiannis, T.1    Boudec, J.-Y.L.2    Vojnovic, M.3
  • 13
    • 39049122093 scopus 로고    scopus 로고
    • Extracting a mobility model from real user traces
    • Barcelona, Spain, April
    • M. Kim, D. Kotz, and S. Kim. Extracting a mobility model from real user traces. In IEEE Infocom, Barcelona, Spain, April 2006.
    • (2006) IEEE Infocom
    • Kim, M.1    Kotz, D.2    Kim, S.3
  • 14
    • 8344230707 scopus 로고    scopus 로고
    • Mobility models for Ad hoc network simulation
    • Hong Kong, China, March
    • G. Lin, G. Noubir, and R. Rajaraman. Mobility Models for Ad hoc Network Simulation. In IEEE Infocom, Hong Kong, China, March 2004.
    • (2004) IEEE Infocom
    • Lin, G.1    Noubir, G.2    Rajaraman, R.3
  • 15
    • 78649291970 scopus 로고    scopus 로고
    • Worst-case background knowledge for privacy-preserving data publishing
    • Istanbul, Turkey, February
    • D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Y. Halpern. Worst-case background knowledge for privacy-preserving data publishing. In IEEE ICDE, Istanbul, Turkey, February 2007.
    • (2007) IEEE ICDE
    • Martin, D.J.1    Kifer, D.2    Machanavajjhala, A.3    Gehrke, J.4    Halpern, J.Y.5
  • 16
    • 70450278755 scopus 로고    scopus 로고
    • Hiding stars with fireworks: Location privacy through camouflage
    • Beijing, China, September
    • J. Meyerowitz and R. R. Choudhury. Hiding stars with fireworks: location privacy through camouflage. In ACM MobiCom, Beijing, China, September 2009.
    • (2009) ACM MobiCom
    • Meyerowitz, J.1    Choudhury, R.R.2
  • 17
    • 84866503356 scopus 로고    scopus 로고
    • Nericell: Rich monitoring of road and traffic conditions using mobile smartphones
    • Raleigh, NC, November
    • P. Mohan, V. N. Padmanabhan, and R. Ramjee. Nericell: Rich monitoring of road and traffic conditions using mobile smartphones. In ACM SenSys, Raleigh, NC, November 2008.
    • (2008) ACM SenSys
    • Mohan, P.1    Padmanabhan, V.N.2    Ramjee, R.3
  • 21
    • 84879152366 scopus 로고    scopus 로고
    • Online
    • ShangHai Grid. Online http://www.cse.ust.hk/dcrg.
    • ShangHai Grid
  • 24
    • 35448967088 scopus 로고    scopus 로고
    • M-invariance: Towards privacy preserving re-publication of dynamic datasets
    • Beijing, China, June
    • X. Xiao and Y. Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In ACM SIGMOD, Beijing, China, June 2007.
    • (2007) ACM SIGMOD
    • Xiao, X.1    Tao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.