-
1
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with privacygrid
-
B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with privacygrid. In Proc. WWW, 2008.
-
Proc. WWW, 2008
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
3
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, H. Shacham, and B. Lynn. Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRPYT, pages 416-432, 2003.
-
(2003)
EUROCRPYT
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Shacham, H.3
Lynn, B.4
-
4
-
-
67649485810
-
Authenticating knn query results in data publishing
-
W. Cheng and K. Tan. Authenticating knn query results in data publishing. In SDM, 2007.
-
(2007)
SDM
-
-
Cheng, W.1
Tan, K.2
-
5
-
-
62749198172
-
Query assurance verification for outsourced multi-dimensional databases
-
W. Cheng and K. Tan. Query assurance verification for outsourced multi-dimensional databases. Journal of Computer Security, 2009.
-
(2009)
Journal of Computer Security
-
-
Cheng, W.1
Tan, K.2
-
6
-
-
84862637019
-
Casper*: Query processing for location services without compromising privacy
-
C. Chow, M. Mokbel, and W. Aref. Casper*: Query processing for location services without compromising privacy. ACM TODS, 2009.
-
(2009)
ACM TODS
-
-
Chow, C.1
Mokbel, M.2
Aref, W.3
-
7
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE TMC, 7(1):1-18, 2008.
-
(2008)
IEEE TMC
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
8
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan. Private queries in location based services: Anonymizers are not necessary. In SIGMOD, 2008.
-
(2008)
SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.5
-
10
-
-
77955179024
-
Privacyaware location data publishing
-
H. Hu, J. Xu, S. T. On, J. Du, and K. Ng. Privacyaware location data publishing. TODS, 35(3), 2010.
-
(2010)
TODS
, vol.35
, Issue.3
-
-
Hu, H.1
Xu, J.2
On, S.T.3
Du, J.4
Ng, K.5
-
11
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
H. Hu, J. Xu, C. Ren, and B. Choi. Processing private queries over untrusted data cloud through privacy homomorphism. In Proc. of ICDE, 2011.
-
Proc. of ICDE, 2011
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
12
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. TKDE, 19(12):1719-1733, 2007.
-
(2007)
TKDE
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
13
-
-
78651408225
-
Authenticated index structures for aggregation queries
-
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Authenticated index structures for aggregation queries. ACM TISSEC, 13(32):1-35, 2010.
-
(2010)
ACM TISSEC
, vol.13
, Issue.32
, pp. 1-35
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
14
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
F. Li, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In Proc. SIGMOD, pages 121-132, 2006.
-
(2006)
Proc. SIGMOD
, pp. 121-132
-
-
Li, F.1
Kollios, G.2
Reyzin, L.3
-
15
-
-
85011031975
-
Proof-infused streams: Enabling authentication of sliding window queries on streams
-
F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios. Proof-infused streams: Enabling authentication of sliding window queries on streams. In VLDB, 2007.
-
(2007)
VLDB
-
-
Li, F.1
Yi, K.2
Hadjieleftheriou, M.3
Kollios, G.4
-
16
-
-
0001263548
-
A certified digital signature
-
R. C. Merkle. A certified digital signature. In Proc. Crypto, pages 218-238, 1989.
-
(1989)
Proc. Crypto
, pp. 218-238
-
-
Merkle, R.C.1
-
17
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying completeness of relational query results in data publishing. In SIGMOD, pages 407-418, 2005.
-
(2005)
SIGMOD
, pp. 407-418
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.-L.4
-
18
-
-
76849102606
-
Authenticating the query results of text search engines
-
H. Pang and K. Mouratidis. Authenticating the query results of text search engines. In VLDB, 2008.
-
(2008)
VLDB
-
-
Pang, H.1
Mouratidis, K.2
-
19
-
-
2442590644
-
Authenticating query results in edge computing
-
H. Pang and K.-L. Tan. Authenticating query results in edge computing. In Proc. ICDE, 2004.
-
Proc. ICDE, 2004
-
-
Pang, H.1
Tan, K.-L.2
-
20
-
-
79955911586
-
Nearest neighbor search with strong location privacy
-
S. Papadopoulos, S. Bakiras, and D. Papadias. Nearest neighbor search with strong location privacy. In VLDB, 2010.
-
(2010)
VLDB
-
-
Papadopoulos, S.1
Bakiras, S.2
Papadias, D.3
-
22
-
-
33747610636
-
Efficient cost models for spatial queries using r-trees
-
Y. Theodoridis, E. Stefanakis, and T. Sellis. Efficient cost models for spatial queries using r-trees. TKDE, 12(1):19-32, 2000.
-
(2000)
TKDE
, vol.12
, Issue.1
, pp. 19-32
-
-
Theodoridis, Y.1
Stefanakis, E.2
Sellis, T.3
-
24
-
-
51349083760
-
Exploring historical location data for anonymity preservation in location-based services
-
Phoenix, Arizona
-
T. Xu and Y. Cai. Exploring historical location data for anonymity preservation in location-based services. In IEEE Infocom, Phoenix, Arizona, 2008.
-
(2008)
IEEE Infocom
-
-
Xu, T.1
Cai, Y.2
-
25
-
-
67650394655
-
Location cloaking for safety protection of ad hoc networks
-
T. Xu and Y. Cai. Location cloaking for safety protection of ad hoc networks. In IEEE Infocom, 2009.
-
(2009)
IEEE Infocom
-
-
Xu, T.1
Cai, Y.2
-
26
-
-
52649150749
-
Spatial outsoucing for location-based services
-
Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Spatial outsoucing for location-based services. In Proc. ICDE, pages 1082-1091, 2008.
-
(2008)
Proc. ICDE
, pp. 1082-1091
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
27
-
-
67649510426
-
Authenticated indexing for outsourced spatial databases
-
Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Authenticated indexing for outsourced spatial databases. The VLDB Journal, 18(3):631-648, 2009.
-
(2009)
The VLDB Journal
, vol.18
, Issue.3
, pp. 631-648
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
28
-
-
79957874657
-
Authentication of moving knn queries
-
M. L. Yiu, E. Lo, and D. Yung. Authentication of moving knn queries. In Proc. ICDE, pages 565-576, 2011.
-
(2011)
Proc. ICDE
, pp. 565-576
-
-
Yiu, M.L.1
Lo, E.2
Yung, D.3
|