-
1
-
-
83155194898
-
-
Available
-
Qype. [Online]. Available: http://www.qype.com
-
Qype. [Online]
-
-
-
3
-
-
78649342447
-
An Obfuscation-Based Approach for Protecting Location Privacy
-
June
-
C. a. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, "An Obfuscation-Based Approach for Protecting Location Privacy,"IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 13-27, June 2009.
-
(2009)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.1
, pp. 13-27
-
-
Ardagna, C.A.1
Cremonini, M.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
4
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
DOI 10.1109/TMC.2007.1062
-
B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008. (Pubitemid 350183929)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
5
-
-
2942524994
-
Location privacy in pervasive computing
-
Jan.
-
A. Beresford and F. Stajano, "Location privacy in pervasive computing,"IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan. 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
6
-
-
36348979829
-
Epidemics of Mobile Worms
-
Y. Bulygin, "Epidemics of Mobile Worms," in 2007 IEEE International Performance, Computing, and Communications Conference, Apr. 2007, pp. 475-478.
-
2007 IEEE International Performance, Computing, and Communications Conference, Apr. 2007
, pp. 475-478
-
-
Bulygin, Y.1
-
7
-
-
44849122540
-
Understanding individual human mobility patterns
-
Jun.
-
M. C. González, C. A. Hidalgo, and A.-L. Barabási, "Understanding individual human mobility patterns." Nature, vol. 453, no. 7196, pp. 779-782, Jun. 2008.
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
González, M.C.1
Hidalgo, C.A.2
Barabási, A.-L.3
-
8
-
-
84885395162
-
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy-Preserving Techniques
-
S. Mascetti, D. Freni, C. Bettini, X. S. Wang, S. Jajodia, and U. D. Milano, "On the Impact of User Movement Simulations in the Evaluation of LBS Privacy-Preserving Techniques," in Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008, 2008.
-
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008, 2008
-
-
Mascetti, S.1
Freni, D.2
Bettini, C.3
Wang, X.S.4
Jajodia, S.5
Milano, U.D.6
-
9
-
-
83155189599
-
New generation of mobile phone viruses and corresponding countermeasures
-
vol. abs/1012.3, Dec.
-
P. Wang, M. C. González, R. Menezes, and A.-L. Barabási, "New generation of mobile phone viruses and corresponding countermeasures,"CoRR, vol. abs/1012.3, Dec. 2010.
-
(2010)
CoRR
-
-
Wang, P.1
González, M.C.2
Menezes, R.3
Barabási, A.-L.4
-
10
-
-
51149098526
-
A Generic Large Scale Simulator for Ubiquitous Computing
-
Los Alamitos, CA, USA: IEEE, Jul.
-
M. Martin and P. Nurmi, "A Generic Large Scale Simulator for Ubiquitous Computing," in 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops. Los Alamitos, CA, USA: IEEE, Jul. 2006, pp. 1-3.
-
(2006)
2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops
, pp. 1-3
-
-
Martin, M.1
Nurmi, P.2
-
11
-
-
83155169346
-
-
06 version 2.1.0. [Online]. Available
-
(2010, 06) Simpy: Simulation in python. version 2.1.0. [Online]. Available: http://simpy.sourceforge.net/
-
(2010)
Simulation in Python
-
-
-
13
-
-
84858164845
-
-
T. N. Company. March Available
-
T. N. Company. (2011, March) Nielsen wire: Who is winning the u.s. smartphone battle? [Online]. Available: http://blog.nielsen.com/nielsenwire/ online mobile/who-is-winning-the-u-s-smartphone-battle
-
(2011)
Who Is Winning the U.s. Smartphone Battle? [Online]
-
-
|