-
1
-
-
77954770667
-
GEPETO: A GEoPrivacy enhancing toolkit
-
Perth, Australia, April
-
S. Gambs, M.-O. Killijian, and M. N. del Prado, "GEPETO: a GEoPrivacy Enhancing Toolkit," in Proceedings of the International Workshop on Advances in Mobile Computing and Applications: Security, Privacy and Trust, held in conjunction with the 24th IEEE AINA conference, Perth, Australia, April 2010.
-
(2010)
Proceedings of the International Workshop on Advances in Mobile Computing and Applications: Security, Privacy and Trust, Held in Conjunction with the 24th IEEE AINA Conference
-
-
Gambs, S.1
Killijian, M.-O.2
Del Prado, M.N.3
-
2
-
-
11244258314
-
Extracting places from traces of locations
-
J. H. Kang, B. Stewarta, G. Borriello, and W. Welbourne, "Extracting places from traces of locations," in Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, 2004, pp. 110-118.
-
(2004)
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots
, pp. 110-118
-
-
Kang, J.H.1
Stewarta, B.2
Borriello, G.3
Welbourne, W.4
-
3
-
-
77149139158
-
Limits of predictability in human mobility
-
C. Song, Z. Qu, N. Blumm, and A.-L. Barabasi, "Limits of predictability in human mobility," Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
-
(2010)
Science
, vol.327
, Issue.5968
, pp. 1018-1021
-
-
Song, C.1
Qu, Z.2
Blumm, N.3
Barabasi, A.-L.4
-
4
-
-
44849122540
-
Understanding individual human mobility patterns
-
June
-
M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding individual human mobility patterns," Nature, vol. 453, no. 7196, pp. 779-782, June 2008.
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
5
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: a model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
6
-
-
67650312114
-
On the anonymity of home/work location pairs
-
May
-
P. Golle and K. Partridge, "On the anonymity of home/work location pairs," Pervasive Computing, pp. 390-397, May 2009.
-
(2009)
Pervasive Computing
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
7
-
-
77956260820
-
-
Department of Computing Faculty of Mathematics, Computing and Technology The Open University, November
-
L. Jedrzejczyk, B. A. Price, A. K. Bandara, and B. Nuseibeh, "I know what you did last summer: risks of location data leakage in mobile and social computing," Department of Computing Faculty of Mathematics, Computing and Technology The Open University, November 2009.
-
(2009)
I Know What You Did Last Summer: Risks of Location Data Leakage in Mobile and Social Computing
-
-
Jedrzejczyk, L.1
Price, B.A.2
Bandara, A.K.3
Nuseibeh, B.4
-
9
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
10
-
-
19544376847
-
Discovering personal gazetteers: An interactive clustering approach
-
Z. Changqing, D. Frankowski, P. Ludford, S. Shekhar, and L. Terveen, "Discovering personal gazetteers: an interactive clustering approach," in Proceedings of the ACM International Workshop on Geographic Information Systems, 2004, pp. 266-273.
-
(2004)
Proceedings of the ACM International Workshop on Geographic Information Systems
, pp. 266-273
-
-
Changqing, Z.1
Frankowski, D.2
Ludford, P.3
Shekhar, S.4
Terveen, L.5
-
11
-
-
84880747814
-
Location-based activity recognition using relational Markov networks
-
L. Liao, D. Fox, and H. Kautz, "Location-based activity recognition using relational Markov networks," in Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), 2005, pp. 773-778.
-
(2005)
Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)
, pp. 773-778
-
-
Liao, L.1
Fox, D.2
Kautz, H.3
-
12
-
-
0018689571
-
An algorithm for tracking multiple targets
-
D. Reiter, "An algorithm for tracking multiple targets," IEEE Transactions on Automatic Control, vol. 24, no. 6, pp. 843-854, 1979.
-
(1979)
IEEE Transactions on Automatic Control
, vol.24
, Issue.6
, pp. 843-854
-
-
Reiter, D.1
-
13
-
-
38049035427
-
Inference attacks on location tracks
-
J. Krumm, "Inference attacks on location tracks," Pervasive Computing, pp. 127-143, 2007.
-
(2007)
Pervasive Computing
, pp. 127-143
-
-
Krumm, J.1
-
14
-
-
33745883087
-
-
February
-
A. Pfitzmann and M. Hansen, "Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology," February 2008.
-
(2008)
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
15
-
-
0033559186
-
Geographically masking health data to preserve confidentiality
-
M. P. Armstrong, G. Rushton, and D. L. Zimmerman, "Geographically masking health data to preserve confidentiality," Statistics in Medicine, vol. 18, pp. 497-525, 1999.
-
(1999)
Statistics in Medicine
, vol.18
, pp. 497-525
-
-
Armstrong, M.P.1
Rushton, G.2
Zimmerman, D.L.3
-
18
-
-
48649103506
-
Protecting moving trajectories with dummies
-
IEEE Computer Society
-
T.-H. You, W.-C. Peng, and W.-C. Lee, "Protecting moving trajectories with dummies," in Proceedings of the 2007 International Conference on Mobile Data Management. IEEE Computer Society, 2007, pp. 278-282.
-
(2007)
Proceedings of the 2007 International Conference on Mobile Data Management.
, pp. 278-282
-
-
You, T.-H.1
Peng, W.-C.2
Lee, W.-C.3
-
20
-
-
78650869043
-
A spatiotemporal model of obfuscation strategies and counter strategies for location privacy
-
D. Matt, K. Lars, and B. Athol, "A spatiotemporal model of obfuscation strategies and counter strategies for location privacy," Lectures Notes in Computer Science, vol. 4197, no. 4, pp. 47-64, 2006.
-
(2006)
Lectures Notes in Computer Science
, vol.4197
, Issue.4
, pp. 47-64
-
-
Matt, D.1
Lars, K.2
Athol, B.3
-
21
-
-
19944372788
-
Keeping ubiquitous computing to yourself: A practical model for user control of privacy
-
B. A. Price, K. Adam, and B. Nuseibeh, "Keeping ubiquitous computing to yourself: A practical model for user control of privacy," Int. J. Human-Computer Studies, pp. 228-253, 2005.
-
(2005)
Int. J. Human-Computer Studies
, pp. 228-253
-
-
Price, B.A.1
Adam, K.2
Nuseibeh, B.3
|