-
1
-
-
79961178948
-
-
Available online through
-
Location-Privacy Meter tool. Available online through http://people.epfl.ch/reza.shokri, 2011.
-
(2011)
Location-privacy Meter Tool
-
-
-
2
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
C. Bettini, X. S. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In In 2nd VLDB Workshop SDM, pages 185-199, 2005.
-
(2005)
2nd VLDB Workshop SDM
, pp. 185-199
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
3
-
-
38149078755
-
Anonymity protocols as noisy channels
-
TGC'06 Berlin, Heidelberg Springer-Verlag
-
K. Chatzikokolakis, C. Palamidessi, and P. Panangaden. Anonymity protocols as noisy channels. In Proceedings of the 2nd international conference on Trustworthy global computing, TGC'06, pages 281-300, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 2nd International Conference on Trustworthy Global Computing
, pp. 281-300
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Panangaden, P.3
-
5
-
-
70349337434
-
Identification via location-profiling in gsm networks
-
New York, NY, USA
-
Y. De Mulder, G. Danezis, L. Batina, and B. Preneel. Identification via location-profiling in gsm networks. In WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, pages 23-32, New York, NY, USA, 2008.
-
(2008)
WPES '08: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society
, pp. 23-32
-
-
De Mulder, Y.1
Danezis, G.2
Batina, L.3
Preneel, B.4
-
7
-
-
78650896411
-
Moving forward: Location privacy and location awareness
-
SPRINGL '10 New York, NY, USA
-
M. Duckham. Moving forward: location privacy and location awareness. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pages 1-3, New York, NY, USA, 2010.
-
(2010)
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
, pp. 1-3
-
-
Duckham, M.1
-
8
-
-
33746335051
-
Differential privacy
-
4052 LNCS, DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork. Differential Privacy. In M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, Automata, Languages and Programming, volume 4052, chapter 1, pages 1-12. Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 1-12
-
-
Dwork, C.1
-
11
-
-
33847315663
-
Protecting location privacy through path confusion
-
Washington, DC, USA IEEE Computer Society
-
B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pages 194-205, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 194-205
-
-
Hoh, B.1
Gruteser, M.2
-
12
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
DOI 10.1109/MPRV.2006.69, 1717364
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38-46, 2006. (Pubitemid 44717470)
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Hui, X.3
Alrabady, A.4
-
14
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm. A survey of computational location privacy. Personal Ubiquitous Comput., 13(6):391-399, 2009.
-
(2009)
Personal Ubiquitous Comput.
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
15
-
-
34147182909
-
Learning and inferring transportation routines
-
DOI 10.1016/j.artint.2007.01.006, PII S0004370207000380
-
L. Liao, D. J. Patterson, D. Fox, and H. Kautz. Learning and inferring transportation routines. Artif. Intell., 171:311-331, April 2007. (Pubitemid 46560477)
-
(2007)
Artificial Intelligence
, vol.171
, Issue.5-6
, pp. 311-331
-
-
Liao, L.1
Patterson, D.J.2
Fox, D.3
Kautz, H.4
-
16
-
-
78649253198
-
Privacy vulnerability of published anonymous mobility traces
-
MobiCom '10 New York, NY, USA ACM
-
C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. In Proceedings of the sixteenth annual international conference on Mobile computing and networking, MobiCom '10, pages 185-196, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking
, pp. 185-196
-
-
Ma, C.Y.1
Yau, D.K.2
Yip, N.K.3
Rao, N.S.4
-
18
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
19
-
-
0018689571
-
An algorithm for tracking multiple targets
-
D. Reid. An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control, 24(6):843-854, 1979.
-
(1979)
IEEE Transactions on Automatic Control
, vol.24
, Issue.6
, pp. 843-854
-
-
Reid, D.1
-
20
-
-
43949174023
-
Bayesian estimation of hidden Markov chains: A stochastic implementation
-
C. Robert, G. Celeux, and J. Diebolt. Bayesian estimation of hidden Markov chains: A stochastic implementation. Statistics & Probability Letters, 16(1):77-83, 1993.
-
(1993)
Statistics & Probability Letters
, vol.16
, Issue.1
, pp. 77-83
-
-
Robert, C.1
Celeux, G.2
Diebolt, J.3
-
22
-
-
74049116479
-
A distortion-based metric for location privacy
-
New York, NY, USA
-
R. Shokri, J. Freudiger, M. Jadliwala, and J.-P. Hubaux. A distortion-based metric for location privacy. In WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society, pages 21-30, New York, NY, USA, 2009.
-
(2009)
WPES '09: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society
, pp. 21-30
-
-
Shokri, R.1
Freudiger, J.2
Jadliwala, M.3
Hubaux, J.-P.4
-
23
-
-
78650182778
-
Unraveling an old cloak: K-anonymity for location privacy
-
WPES '10 New York, NY, USA ACM
-
R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.-P. Hubaux. Unraveling an old cloak: k-anonymity for location privacy. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES '10, pages 115-118, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 115-118
-
-
Shokri, R.1
Troncoso, C.2
Diaz, C.3
Freudiger, J.4
Hubaux, J.-P.5
-
24
-
-
74049160327
-
The Bayesian traffic analysis of mix networks
-
CCS '09 New York, NY, USA ACM
-
C. Troncoso and G. Danezis. The bayesian traffic analysis of mix networks. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 369-379, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 369-379
-
-
Troncoso, C.1
Danezis, G.2
|