-
1
-
-
79960865500
-
-
Social Serendipity. See http://http://reality.media.mit.edu/serendipity. php.
-
-
-
-
3
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Capkun, S.1
Hubaux, J.-P.2
-
4
-
-
35448936042
-
Smokescreen: Flexible privacy controls for presence-sharing
-
L.P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In ACM MobiSys, 2007.
-
(2007)
ACM MobiSys
-
-
Cox, L.P.1
Dalton, A.2
Marupadi, V.3
-
5
-
-
4444288136
-
A delay-tolerant network architecture for challenged internets
-
K. Fall. A delay-tolerant network architecture for challenged internets. In ACM SIGCOMM, 2003.
-
(2003)
ACM SIGCOMM
-
-
Fall, K.1
-
7
-
-
35348872757
-
A customizable k-anonymity model for protecting location privacy
-
B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy. In IEEE ICDCS, 2005.
-
(2005)
IEEE ICDCS
-
-
Gedik, B.1
Liu, L.2
-
8
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, 2003.
-
(2003)
ACM MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
10
-
-
85127507791
-
Virtual trip lines for distributed privacy-preserving traffic monitoring
-
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.C. Herrera, A.M. Bayen, M. Annavaram, and Q. Jacobson. Virtual trip lines for distributed privacy-preserving traffic monitoring. In ACM MobiSys, 2008.
-
(2008)
ACM MobiSys
-
-
Hoh, B.1
Gruteser, M.2
Herring, R.3
Ban, J.4
Work, D.5
Herrera, J.C.6
Bayen, A.M.7
Annavaram, M.8
Jacobson, Q.9
-
14
-
-
59249084348
-
Locationbased trust for mobile user-generated content: Applications, challenges and implementations
-
V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Locationbased trust for mobile user-generated content: applications, challenges and implementations. In ACM HotMobile, 2008.
-
(2008)
ACM HotMobile
-
-
Lenders, V.1
Koukoumidis, E.2
Zhang, P.3
Martonosi, M.4
-
16
-
-
77951534174
-
Proving your location without giving up your privacy
-
W. Luo and U. Hengartner. Proving your location without giving up your privacy. In ACM HotMobile, 2010.
-
(2010)
ACM HotMobile
-
-
Luo, W.1
Hengartner, U.2
-
17
-
-
67650652709
-
We saw each other on the subway: Secure, anonymous proximity-based missed connections
-
J. Manweiler, R. Scudellari, Z. Cancio, and L.P. Cox. We saw each other on the subway: secure, anonymous proximity-based missed connections. In ACM HotMobile, 2009.
-
(2009)
ACM HotMobile
-
-
Manweiler, J.1
Scudellari, R.2
Cancio, Z.3
Cox, L.P.4
-
18
-
-
74049135283
-
SMILE: Encounter-based trust for mobile social services
-
J. Manweiler, R. Scudellari, and L.P. Cox. SMILE: Encounter-based trust for mobile social services. In ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Manweiler, J.1
Scudellari, R.2
Cox, L.P.3
-
20
-
-
38349067290
-
-
Feb. 15
-
A. Pfitzmann and M. Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management-a Consolidated Proposal for Terminology (Version v0. 31 Feb. 15, 2008). See http://dud.inf.tu-dresden. de/literatur.
-
(2008)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management-a Consolidated Proposal for Terminology (Version v0. 31
-
-
Pfitzmann, A.1
Hansen, M.2
-
22
-
-
67650661394
-
Enabling new mobile applications with location proofs
-
S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In ACM HotMobile, 2009.
-
(2009)
ACM HotMobile
-
-
Saroiu, S.1
Wolman, A.2
-
24
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In IEEE INFOCOM, 2008.
-
(2008)
IEEE INFOCOM
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
25
-
-
51349083760
-
Exploring historical location data for anonymity preservation in location-based services
-
T. Xu and Y. Cai. Exploring historical location data for anonymity preservation in location-based services. In IEEE INFOCOM, 2008.
-
(2008)
IEEE INFOCOM
-
-
Xu, T.1
Cai, Y.2
-
26
-
-
74049157401
-
Feeling-based location privacy protection for locationbased services
-
T. Xu and Y. Cai. Feeling-based location privacy protection for locationbased services. In ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Xu, T.1
Cai, Y.2
-
27
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network traffic in sensor networks. In ACM WiSec, 2008.
-
(2008)
ACM WiSec
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
28
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci. A social network based patching scheme for worm containment in cellular networks. IEEE INFOCOM 2009.
-
(2009)
IEEE INFOCOM
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
|