메뉴 건너뛰기




Volumn 6794 LNCS, Issue , 2011, Pages 57-76

Quantifying location privacy: The case of sporadic location exposure

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN NETWORKS; GEOGRAPHICAL DISTRIBUTION; GEOGRAPHICAL REGIONS; INFERENCE ENGINES; LOCATION BASED SERVICES; MARKOV PROCESSES; PRIVACY-PRESERVING TECHNIQUES; TECHNOLOGY TRANSFER; TELECOMMUNICATION SERVICES; USER PROFILE;

EID: 79961201025     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22263-4_4     Document Type: Conference Paper
Times cited : (84)

References (21)
  • 2
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46-55 (2003)
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 4
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. Springer, Heidelberg
    • Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3468
    • Duckham, M.1    Kulik, L.2
  • 6
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1-18 (2008)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 10
    • 33750879264 scopus 로고    scopus 로고
    • Enhancing security and privacy in traffic-monitoring systems
    • Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing 5(4), 38-46 (2006)
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.4 , pp. 38-46
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 12
    • 38049035427 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. Springer, Heidelberg
    • Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127-143. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4480 , pp. 127-143
    • Krumm, J.1
  • 13
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput. 13(6), 391-399 (2009)
    • (2009) Personal Ubiquitous Comput. , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 16
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257-286 (1989)
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 21
    • 50249128196 scopus 로고    scopus 로고
    • Perfect matching disclosure attacks
    • Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
    • Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 2-23. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5134 , pp. 2-23
    • Troncoso, C.1    Gierlichs, B.2    Preneel, B.3    Verbauwhede, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.