-
2
-
-
2942524994
-
Location privacy in pervasive computing
-
Jan.
-
A. Beresford and F. Stajano, "Location privacy in pervasive computing,"IEEE Pervasive Computing, vol. 2, pp. 46-55, Jan. 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
3
-
-
0035013232
-
Convex position estimation in wireless sensor networks
-
Citeseer
-
L. Doherty, K. Pister, and L. El Ghaoui, "Convex position estimation in wireless sensor networks," in IEEE International Conference on Computer Communications, vol. 3, pp. 1655-1663, Citeseer, 2001.
-
(2001)
IEEE International Conference on Computer Communications
, vol.3
, pp. 1655-1663
-
-
Doherty, L.1
Pister, K.2
El Ghaoui, L.3
-
5
-
-
0035424017
-
Location systems for ubiquitous computing
-
J. Hightower and G. Borriello, "Location systems for ubiquitous computing,"IEEE Computer, pp. 57-66.
-
IEEE Computer
, pp. 57-66
-
-
Hightower, J.1
Borriello, G.2
-
6
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
DOI 10.1007/s11036-005-6425-1
-
M. Gruteser and D. Grunwald, "Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis,"Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, 2005. (Pubitemid 41201656)
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
7
-
-
35449007284
-
Preserving location privacy in wireless lans
-
T. Jiang, H. J. Wang, and Y. C. Hu, "Preserving location privacy in wireless lans," in Proc. of Mobile systems, applications and services (MobiSys), (New York, NY, USA), 2007.
-
Proc. of Mobile Systems, Applications and Services (MobiSys), (New York, NY, USA), 2007
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.C.3
-
9
-
-
77951524528
-
The directional attack on wireless localization: How to spoof your location with a tin can
-
IEEE Press
-
K. Bauer, D. McCoy, E. Anderson, M. Breitenbach, G. Grudic, D. Grunwald, and D. Sicker, "The directional attack on wireless localization: how to spoof your location with a tin can," in Proc. of IEEE conference on Global telecommunications, pp. 4125-4130, IEEE Press, 2009.
-
(2009)
Proc. of IEEE Conference on Global Telecommunications
, pp. 4125-4130
-
-
Bauer, K.1
McCoy, D.2
Anderson, E.3
Breitenbach, M.4
Grudic, G.5
Grunwald, D.6
Sicker, D.7
-
11
-
-
33645013395
-
Analysis of wireless geolocation in a non-line-of-sight environment
-
Y. Qi, H. Kobayashi, and H. Suda, "Analysis of wireless geolocation in a non-line-of-sight environment," IEEE Transactions on Wireless Communications, vol. 5, no. 3, pp. 672-681, 2006.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.3
, pp. 672-681
-
-
Qi, Y.1
Kobayashi, H.2
Suda, H.3
-
13
-
-
58149507856
-
Distributed utility-maximization using a resource pricing power control in uplink DS-CDMA
-
Apr.
-
S. wook Han, H. Kim, and Y. Han, "Distributed utility-maximization using a resource pricing power control in uplink DS-CDMA," IEEE Communications Letters, vol. 12, pp. 286-288, Apr. 2008.
-
(2008)
IEEE Communications Letters
, vol.12
, pp. 286-288
-
-
Wook Han, S.1
Kim, H.2
Han, Y.3
-
14
-
-
50249163163
-
Performance analysis of active target localization using TDOA and FDOA measurements in WSN
-
J. Li, X. Sun, P. Huang, and J. Pang, "Performance analysis of active target localization using TDOA and FDOA measurements in WSN,"in Proc. of the Advanced Information Networking and Applications - Workshops, pp. 585-589, 2008.
-
(2008)
Proc. of the Advanced Information Networking and Applications - Workshops
, pp. 585-589
-
-
Li, J.1
Sun, X.2
Huang, P.3
Pang, J.4
-
15
-
-
84962389848
-
Use of fingerprinting in Wi-Fi based outdoor positioning
-
I. J. Quader, B. Li, W. Peng, and A. G. Dempster, "Use of fingerprinting in Wi-Fi based outdoor positioning," in Proc. of International Global Navigation Satellite Systems Society IGNSS Symposium, 2007.
-
Proc. of International Global Navigation Satellite Systems Society IGNSS Symposium, 2007
-
-
Quader, I.J.1
Li, B.2
Peng, W.3
Dempster, A.G.4
|