-
1
-
-
84860737768
-
-
Retrieved March 15, 2012, from
-
AroundMe. Retrieved March 15, 2012, from http://www.tweakersoft.com/ aroundme.html.
-
AroundMe
-
-
-
3
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
IEEE Computer Society
-
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proceedings of ICDCS '05, Washington, DC, USA, 2005. IEEE Computer Society.
-
Proceedings of ICDCS '05, Washington, DC, USA, 2005
-
-
Gedik, B.1
Liu, L.2
-
5
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of MobiSys '03, New York, NY, USA, 2003. ACM.
-
Proc. of MobiSys '03, New York, NY, USA, 2003
-
-
Gruteser, M.1
Grunwald, D.2
-
6
-
-
85127507791
-
Virtual trip lines for distributed privacy-preserving traffic monitoring
-
ACM
-
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson. Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proc. of MobiSys '08, New York, NY, USA, 2008. ACM.
-
Proc. of MobiSys '08, New York, NY, USA, 2008
-
-
Hoh, B.1
Gruteser, M.2
Herring, R.3
Ban, J.4
Work, D.5
Herrera, J.-C.6
Bayen, A.M.7
Annavaram, M.8
Jacobson, Q.9
-
7
-
-
11244341722
-
Learning and inferring transportation routines
-
AAAI Press
-
L. Liao, D. Fox, and H. Kautz. Learning and inferring transportation routines. In Proc. of AAAI'04. AAAI Press, 2004.
-
(2004)
Proc. of AAAI'04
-
-
Liao, L.1
Fox, D.2
Kautz, H.3
-
8
-
-
78649253198
-
Privacy vulnerability of published anonymous mobility traces
-
ACM
-
C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao. Privacy vulnerability of published anonymous mobility traces. In Proc. of MobiCom '10, New York, NY, USA, 2010. ACM.
-
Proc. of MobiCom '10, New York, NY, USA, 2010
-
-
Ma, C.Y.1
Yau, D.K.2
Yip, N.K.3
Rao, N.S.4
-
9
-
-
84860743595
-
A distortion-based metric for location privacy
-
ACM
-
R. Shokri, J. Freudiger, M. Jadliwala, and J.-P. Hubaux. A distortion-based metric for location privacy. In Proc. of WPES '09, New York, NY, USA, 2009. ACM.
-
Proc. of WPES '09, New York, NY, USA, 2009
-
-
Shokri, R.1
Freudiger, J.2
Jadliwala, M.3
Hubaux, J.-P.4
-
10
-
-
83355168199
-
Unraveling an old cloak: K-anonymity for location privacy
-
ACM
-
R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.-P. Hubaux. Unraveling an old cloak: k-anonymity for location privacy. In Proc. of WPES '10, New York, NY, USA, 2010. ACM.
-
Proc. of WPES '10, New York, NY, USA, 2010
-
-
Shokri, R.1
Troncoso, C.2
Diaz, C.3
Freudiger, J.4
Hubaux, J.-P.5
-
11
-
-
84860755091
-
Quantifying location privacy: The case of sporadic location exposure
-
Springer-Verlag
-
R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, and J.-Y. Le Boudec. Quantifying location privacy: the case of sporadic location exposure. In Proc. of PETS'11, Berlin, Heidelberg, 2011. Springer-Verlag.
-
Proc. of PETS'11, Berlin, Heidelberg, 2011
-
-
Shokri, R.1
Theodorakopoulos, G.2
Danezis, G.3
Hubaux, J.-P.4
Le Boudec, J.-Y.5
-
12
-
-
80051968910
-
Quantifying location privacy
-
IEEE Computer Society
-
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, Washington, DC, USA, 2011. IEEE Computer Society.
-
Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, Washington, DC, USA, 2011
-
-
Shokri, R.1
Theodorakopoulos, G.2
Le Boudec, J.-Y.3
Hubaux, J.-P.4
|