-
1
-
-
61449174042
-
-
ISSA
-
Ardagna C.A., Cremonini M., Damiani E., De Capitani di Vimercati S., Samariti P. (2007) Location Privacy Protection through Obfuscation-based Techniques, ISSA.
-
(2007)
Location Privacy Protection Through Obfuscation-based Techniques
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
de Capitani di Vimercati, S.4
Samariti, P.5
-
6
-
-
84958756084
-
-
Fifth European Symposium on Research in Computer Security, Springer-Verlag, Louvain-la-Neuve, Belgium
-
Kesdogan D., Reichl P., Junghärtchen K. (1998) Distributed Temporary Pseudonyms: A Newa Approach for Protecting Location Information in Mobile Communication Networks, Fifth European Symposium on Research in Computer Security, Springer-Verlag, Louvain-la-Neuve, Belgium 1485 295-312.
-
(1998)
Distributed Temporary Pseudonyms: A Newa Approach for Protecting Location Information in Mobile Communication Networks
, pp. 295-312
-
-
Kesdogan, D.1
Reichl, P.2
Junghärtchen, K.3
-
7
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing, 2nd International conference on mobile systems
-
ACM Press, 177189
-
Hong J.I., Landay J.A. (2004) An architecture for privacy-sensitive ubiquitous computing, 2nd International Conference on Mobile Systems, Applications and Services, ACM Press, 177189.
-
(2004)
Applications and Services
-
-
Hong, J.I.1
Landay, J.A.2
-
8
-
-
77951287826
-
Louis, Lester and Pierre: Three protocols for location privacy
-
Ottawa, Canada
-
Zhong G., Goldberg I., Hengartner U. (2007) Louis, Lester and Pierre: Three Protocols for Location Privacy, Seventh Privacy Enhancing Technologies Symposium (PET 2007), Ottawa, Canada.
-
(2007)
Seventh Privacy Enhancing Technologies Symposium (PET 2007)
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
-
9
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Springer-Verlag
-
Duckham M., Kulik L. (2005) A Formal Model of Obfuscation and Negotiation for Location Privacy, PERVASIVE, LNCS, Springer-Verlag, volume 3468 152-170.
-
(2005)
PERVASIVE, LNCS
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
10
-
-
79953237473
-
-
SATNAC, Stellenbosch, South Africa
-
Croft N.J., Olivier M.S. (2004) Using a Trusted Third Party Proxy in achieving GSM Anonymity, South African Telecommunication Network and Applications Conference, SATNAC, Stellenbosch, South Africa.
-
(2004)
Using a Trusted Third Party Proxy in Achieving GSM Anonymity, South African Telecommunication Network and Applications Conference
-
-
Croft, N.J.1
Olivier, M.S.2
-
17
-
-
84885889572
-
A Model for SPAM prevention in IP telephone networks using anonymous verifying authorities
-
ISSA, Midrand, South Africa
-
Croft N.J., Olivier M.S. (2005) A Model for SPAM Prevention in IP Telephone Networks using Anonymous Verifying Authorities, Fifth South African Security Conference, ISSA, Midrand, South Africa.
-
(2005)
Fifth South African Security Conference
-
-
Croft, N.J.1
Olivier, M.S.2
-
22
-
-
0001730497
-
Non-Cooperative games, The annals of mathematics
-
Nash J. (1951) Non-Cooperative Games, The Annals of Mathematics, Second Series, volume 54 number 2 286-295.
-
(1951)
Second Series
, vol.54
, Issue.2
, pp. 286-295
-
-
Nash, J.1
|