-
1
-
-
0036360781
-
Routing through the mist: privacy preserving communication in ubiquitous computing environments
-
ICDCS'02, Austria
-
Al-Muhtadi J, Campbell RH, Kapadia A, Mickunas MD, Yi S (2002) Routing through the mist: privacy preserving communication in ubiquitous computing environments. In: ICDCS'02, Austria, pp 74-83.
-
(2002)
, pp. 74-83
-
-
Al-Muhtadi, J.1
Campbell, R.H.2
Kapadia, A.3
Mickunas, M.D.4
Yi, S.5
-
2
-
-
4043168634
-
The IBM PCIXCC: a new cryptographic coprocessor for the IBM eServer
-
Arnold TW, van Doorn L (2004) The IBM PCIXCC: a new cryptographic coprocessor for the IBM eServer. IBM J Res Dev 48(3-4): 475-488.
-
(2004)
IBM J Res Dev
, vol.48
, Issue.3-4
, pp. 475-488
-
-
Arnold, T.W.1
van Doorn, L.2
-
5
-
-
57349191501
-
-
WWW'08, Beijin, China
-
Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: WWW'08, Beijin, China, pp 237-246.
-
(2008)
Supporting anonymous location queries in mobile environments with privacygrid
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
6
-
-
34247369863
-
-
DaMoN'06, Chicago, IL
-
Bhattacharjee B, Abe N, Goldman K, Zadrozny B, Chillakuru VR, del Carpio M, Apte C (2006) Using secure coprocessors for privacy preserving collaborative data mining and analysis. In: DaMoN'06, Chicago, IL, p 1.
-
(2006)
Using secure coprocessors for privacy preserving collaborative data mining and analysis
, pp. 1
-
-
Bhattacharjee, B.1
Abe, N.2
Goldman, K.3
Zadrozny, B.4
Chillakuru, V.R.5
del Carpio, M.6
Apte, C.7
-
8
-
-
79951510144
-
Cabbies threaten strike over GPS systems
-
Cabbies threaten strike over GPS systems. http://www. cnn. com/2007/TECH/08/01/gps. taxi. strike. ap/index. html.
-
-
-
-
9
-
-
0032201622
-
Private information retrieval
-
Chor B, Kushilevitz E, Goldreich O, Sudan M (1998) Private information retrieval. J ACM 45(6): 965-981.
-
(1998)
J ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
18744366643
-
-
CCS'03, Washingtion, DC
-
Damiani E, Vimercati SDC, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: CCS'03, Washingtion, DC, pp 93-102.
-
(2003)
Balancing confidentiality and efficiency in untrusted relational DBMSs
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
35348924316
-
PRIVE: anonymous location-based queries in distributed mobile systems
-
WWW'07, Alberta CA
-
Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVE: anonymous location-based queries in distributed mobile systems. In: WWW'07, Alberta CA, pp 371-380.
-
(2007)
, pp. 371-380
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
14
-
-
57149129292
-
-
SIGMOD'08, Vancouver, Canada
-
Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K-L (2008) Private queries in location based services: anonymizers are not necessary. In: SIGMOD'08, Vancouver, Canada, pp 121-132.
-
(2008)
Private queries in location based services: Anonymizers are not necessary
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
15
-
-
44849122540
-
Understanding individual human mobility patterns
-
Gonzalez MC, Hidalgo CA, Barabasi A (2008) Understanding individual human mobility patterns. Nature 453: 779-782.
-
(2008)
Nature
, vol.453
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.3
-
18
-
-
84902504748
-
Private information storage with logarithm-space secure hardware
-
Toulouse, France
-
Iliev A, Smith SW, (2004) Private information storage with logarithm-space secure hardware. In: International information security workshops, Toulouse, France, pp 201-216.
-
(2004)
International information security workshops
, pp. 201-216
-
-
Iliev, A.1
Smith, S.W.2
-
19
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
Iliev A, Smith S (2005a) Protecting client privacy with trusted computing at the server. IEEE Secur Priv 3(2): 20-28.
-
(2005)
IEEE Secur Priv
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.2
-
22
-
-
2342505463
-
-
ACSAC'01, Washington, DC
-
Jiang S, Smith S, Minami K (2001) Securing web servers against insider attack. In: ACSAC'01, Washington, DC, pp 265.
-
(2001)
Securing web servers against insider attack
, pp. 265
-
-
Jiang, S.1
Smith, S.2
Minami, K.3
-
26
-
-
70349503536
-
SPIRAL, a scalable private information retrieval approach to location privacy
-
In conjunction with MDM'08, Beijing, China
-
Khoshgozaran A, Shirani-Mehr H, Shahabi C (2008) SPIRAL, a scalable private information retrieval approach to location privacy. In: The 2nd international workshop on privacy-aware location-based mobile services (PALMS). In conjunction with MDM'08, Beijing, China.
-
(2008)
The 2nd international workshop on privacy-aware location-based mobile services (PALMS)
-
-
Khoshgozaran, A.1
Shirani-Mehr, H.2
Shahabi, C.3
-
27
-
-
0031378815
-
-
FOCS'97, Miami Beach, Florida
-
Kushilevitz E, Ostrovsky R (1997) Replication is not needed: single database, computationally private information retrieval. In: FOCS'97, Miami Beach, Florida, pp 364-373.
-
(1997)
Replication is not needed: Single database, computationally private information retrieval
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
28
-
-
34547720006
-
-
VLDB'06, Seoul, Korea
-
Mokbel MF, Chow C-Y, Aref WG (2006)The new casper: query processing for location services without compromising privacy. In: VLDB'06, Seoul, Korea, pp 763-774.
-
(2006)
The new casper: Query processing for location services without compromising privacy
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
31
-
-
54049092431
-
Protecting business intelligence and customer privacy while outsourcing data mining tasks
-
Qiu L, Li Y, Wu X (2008) Protecting business intelligence and customer privacy while outsourcing data mining tasks. Knowl Inf Syst 17(1): 99-120.
-
(2008)
Knowl Inf Syst
, vol.17
, Issue.1
, pp. 99-120
-
-
Qiu, L.1
Li, Y.2
Wu, X.3
-
35
-
-
67349248073
-
A hybrid multi-group approach for privacy-preserving data mining
-
Teng Z, Du W (2009) A hybrid multi-group approach for privacy-preserving data mining. Knowl Inf Syst 19(2): 133-157.
-
(2009)
Knowl Inf Syst
, vol.19
, Issue.2
, pp. 133-157
-
-
Teng, Z.1
Du, W.2
-
37
-
-
33750268079
-
-
ESORICS'06, Germany
-
Wang S, Ding X, Deng RH, Bao F (2006) Private information retrieval using trusted hardware. In: ESORICS'06, Germany, pp 49-64.
-
(2006)
Private information retrieval using trusted hardware
, pp. 49-64
-
-
Wang, S.1
Ding, X.2
Deng, R.H.3
Bao, F.4
-
38
-
-
34147125465
-
Handicapping attacker's confidence: an alternative to k-anonymization
-
Wang K, Fung BCM, Yu PS (2007) Handicapping attacker's confidence: an alternative to k-anonymization. Knowl Inf Syst 11(3): 345-368.
-
(2007)
Knowl Inf Syst
, vol.11
, Issue.3
, pp. 345-368
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
41
-
-
28044449142
-
-
ICDE'05, Tokyo, Japan
-
Xiong X, Mokbel MF, Aref WG (2005) Sea-cnn: scalable processing of continuous k-nearest neighbor queries in spatio-temporal databases. In: ICDE'05, Tokyo, Japan, pp 643-654.
-
(2005)
Sea-cnn: Scalable processing of continuous k-nearest neighbor queries in spatio-temporal databases
, pp. 643-654
-
-
Xiong, X.1
Mokbel, M.F.2
Aref, W.G.3
-
42
-
-
52649118020
-
-
ICDE'08, Cancun, Mexico
-
Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE'08, Cancun, Mexico, pp 366-375.
-
(2008)
Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
-
43
-
-
23944481004
-
-
ICDE'05, Tokyo, Japan
-
Yu X, Pu KQ, Koudas N (2005) Monitoring k-nearest neighbor queries over moving objects. In: ICDE'05, Tokyo, Japan, pp 631-642.
-
(2005)
Monitoring k-nearest neighbor queries over moving objects
, pp. 631-642
-
-
Yu, X.1
Pu, K.Q.2
Koudas, N.3
|