메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1889-1897

APPLAUS: A privacy-preserving location proof updating system for location-based services

Author keywords

[No Author keywords available]

Indexed keywords

BLUETOOTH ENABLED MOBILES; CO-LOCATED; LOCATION PRIVACY; LOCATION-BASED SERVICES; NETWORK INFRASTRUCTURE; POWER COSTS; PRIVACY PRESERVING; SOURCE-LOCATION PRIVACY; USER-CENTRIC;

EID: 79960883633     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934991     Document Type: Conference Paper
Times cited : (129)

References (28)
  • 1
    • 79960865500 scopus 로고    scopus 로고
    • Social Serendipity. See http://http://reality.media.mit.edu/serendipity. php.
  • 3
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Capkun, S.1    Hubaux, J.-P.2
  • 4
    • 35448936042 scopus 로고    scopus 로고
    • Smokescreen: Flexible privacy controls for presence-sharing
    • L.P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In ACM MobiSys, 2007.
    • (2007) ACM MobiSys
    • Cox, L.P.1    Dalton, A.2    Marupadi, V.3
  • 5
    • 4444288136 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged internets
    • K. Fall. A delay-tolerant network architecture for challenged internets. In ACM SIGCOMM, 2003.
    • (2003) ACM SIGCOMM
    • Fall, K.1
  • 7
    • 35348872757 scopus 로고    scopus 로고
    • A customizable k-anonymity model for protecting location privacy
    • B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy. In IEEE ICDCS, 2005.
    • (2005) IEEE ICDCS
    • Gedik, B.1    Liu, L.2
  • 8
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, 2003.
    • (2003) ACM MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 14
    • 59249084348 scopus 로고    scopus 로고
    • Locationbased trust for mobile user-generated content: Applications, challenges and implementations
    • V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Locationbased trust for mobile user-generated content: applications, challenges and implementations. In ACM HotMobile, 2008.
    • (2008) ACM HotMobile
    • Lenders, V.1    Koukoumidis, E.2    Zhang, P.3    Martonosi, M.4
  • 16
    • 77951534174 scopus 로고    scopus 로고
    • Proving your location without giving up your privacy
    • W. Luo and U. Hengartner. Proving your location without giving up your privacy. In ACM HotMobile, 2010.
    • (2010) ACM HotMobile
    • Luo, W.1    Hengartner, U.2
  • 17
    • 67650652709 scopus 로고    scopus 로고
    • We saw each other on the subway: Secure, anonymous proximity-based missed connections
    • J. Manweiler, R. Scudellari, Z. Cancio, and L.P. Cox. We saw each other on the subway: secure, anonymous proximity-based missed connections. In ACM HotMobile, 2009.
    • (2009) ACM HotMobile
    • Manweiler, J.1    Scudellari, R.2    Cancio, Z.3    Cox, L.P.4
  • 18
    • 74049135283 scopus 로고    scopus 로고
    • SMILE: Encounter-based trust for mobile social services
    • J. Manweiler, R. Scudellari, and L.P. Cox. SMILE: Encounter-based trust for mobile social services. In ACM CCS, 2009.
    • (2009) ACM CCS
    • Manweiler, J.1    Scudellari, R.2    Cox, L.P.3
  • 22
    • 67650661394 scopus 로고    scopus 로고
    • Enabling new mobile applications with location proofs
    • S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In ACM HotMobile, 2009.
    • (2009) ACM HotMobile
    • Saroiu, S.1    Wolman, A.2
  • 23
  • 24
    • 51349086896 scopus 로고    scopus 로고
    • Towards statistically strong source anonymity for sensor networks
    • M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In IEEE INFOCOM, 2008.
    • (2008) IEEE INFOCOM
    • Shao, M.1    Yang, Y.2    Zhu, S.3    Cao, G.4
  • 25
    • 51349083760 scopus 로고    scopus 로고
    • Exploring historical location data for anonymity preservation in location-based services
    • T. Xu and Y. Cai. Exploring historical location data for anonymity preservation in location-based services. In IEEE INFOCOM, 2008.
    • (2008) IEEE INFOCOM
    • Xu, T.1    Cai, Y.2
  • 26
    • 74049157401 scopus 로고    scopus 로고
    • Feeling-based location privacy protection for locationbased services
    • T. Xu and Y. Cai. Feeling-based location privacy protection for locationbased services. In ACM CCS, 2009.
    • (2009) ACM CCS
    • Xu, T.1    Cai, Y.2
  • 27
    • 56749163645 scopus 로고    scopus 로고
    • Towards event source unobservability with minimum network traffic in sensor networks
    • Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network traffic in sensor networks. In ACM WiSec, 2008.
    • (2008) ACM WiSec
    • Yang, Y.1    Shao, M.2    Zhu, S.3    Urgaonkar, B.4    Cao, G.5
  • 28
    • 70349659420 scopus 로고    scopus 로고
    • A social network based patching scheme for worm containment in cellular networks
    • Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci. A social network based patching scheme for worm containment in cellular networks. IEEE INFOCOM 2009.
    • (2009) IEEE INFOCOM
    • Zhu, Z.1    Cao, G.2    Zhu, S.3    Ranjan, S.4    Nucci, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.