-
3
-
-
70349337434
-
Identification via locationprofiling in gsm networks
-
ACM Press, New York
-
De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via locationprofiling in gsm networks. In: WPES 2008: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 23-32. ACM Press, New York (2008)
-
(2008)
WPES 2008: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society
, pp. 23-32
-
-
De Mulder, Y.1
Danezis, G.2
Batina, L.3
Preneel, B.4
-
4
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. Springer, Heidelberg
-
Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3468
-
-
Duckham, M.1
Kulik, L.2
-
6
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1-18 (2008)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
8
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM Press, New York
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31-42. ACM Press, New York (2003)
-
(2003)
MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
10
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing 5(4), 38-46 (2006)
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
11
-
-
57349108972
-
Preserving privacy in gps traces via uncertainty-aware path cloaking
-
ACM Press, New York
-
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 161-171. ACM Press, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 161-171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
12
-
-
38049035427
-
Inference attacks on location tracks
-
LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. Springer, Heidelberg
-
Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127-143. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4480
, pp. 127-143
-
-
Krumm, J.1
-
13
-
-
67650320950
-
A survey of computational location privacy
-
Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput. 13(6), 391-399 (2009)
-
(2009)
Personal Ubiquitous Comput.
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
14
-
-
78649253198
-
Privacy vulnerability of published anonymous mobility traces
-
ACM Press, New York
-
Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. In: Proceedings of the sixteenth annual international conference on Mobile computing and networking. MobiCom 2010, pp. 185-196. ACM Press, New York (2010)
-
(2010)
Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking. MobiCom 2010
, pp. 185-196
-
-
Ma, C.Y.1
Yau, D.K.2
Yip, N.K.3
Rao, N.S.4
-
16
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257-286 (1989)
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
17
-
-
80051982003
-
A unified framework for location privacy
-
EPFL, Switzerland
-
Shokri, R., Freudiger, J., Hubaux, J.-P.: A unified framework for location privacy. Technical Report EPFL-REPORT-148708, EPFL, Switzerland (2010)
-
(2010)
Technical Report EPFL-REPORT-148708
-
-
Shokri, R.1
Freudiger, J.2
Hubaux, J.-P.3
-
18
-
-
74049116479
-
A distortion-based metric for location privacy
-
ACM Press, New York
-
Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.-P.: A distortion-based metric for location privacy. In: WPES 2009: Proceedings of the 8th ACM workshop on Privacy in the electronic society, pp. 21-30. ACM Press, New York (2009)
-
(2009)
WPES 2009: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society
, pp. 21-30
-
-
Shokri, R.1
Freudiger, J.2
Jadliwala, M.3
Hubaux, J.-P.4
-
19
-
-
80051968910
-
Quantifying location privacy
-
Shokri, R., Theodorakopoulos, G., Boudec, J.-Y.L., Hubaux, J.-P.: Quantifying location privacy. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (2011)
-
IEEE Symposium on Security and Privacy, Oakland, CA, USA (2011)
-
-
Shokri, R.1
Theodorakopoulos, G.2
Boudec, J.-Y.L.3
Hubaux, J.-P.4
-
20
-
-
78650182778
-
Unraveling an old cloak: k-anonymity for location privacy
-
ACM Press, New York
-
Shokri, R., Troncoso, C., Diaz, C., Freudiger, J., Hubaux, J.-P.: Unraveling an old cloak: k-anonymity for location privacy. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society. WPES 2010, pp. 115-118. ACM Press, New York (2010)
-
(2010)
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society. WPES 2010
, pp. 115-118
-
-
Shokri, R.1
Troncoso, C.2
Diaz, C.3
Freudiger, J.4
Hubaux, J.-P.5
-
21
-
-
50249128196
-
Perfect matching disclosure attacks
-
Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
-
Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 2-23. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5134
, pp. 2-23
-
-
Troncoso, C.1
Gierlichs, B.2
Preneel, B.3
Verbauwhede, I.4
|