메뉴 건너뛰기




Volumn , Issue , 2012, Pages 375-382

Location anonymity based on fake queries in continuous location-based services

Author keywords

continuous queries; K anonymity; location based services

Indexed keywords

ABNORMAL POINT; CONTINUOUS QUERIES; K-ANONYMITY; LARGE-SCALE DEPLOYMENT; LOCATION ANONYMITY; LOCATION INFORMATION; LOCATION PRIVACY; MAXIMUM SPEED; MOBILE USERS; PERSONAL INFORMATION; SECURITY ANALYSIS; SERVICE PROVIDER;

EID: 84869393296     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2012.40     Document Type: Conference Paper
Times cited : (15)

References (20)
  • 1
    • 40949126919 scopus 로고    scopus 로고
    • A ttp-free protocol for location privacy in location-based services
    • A. Solanas and A. Martínez-Ballesté, "A ttp-free protocol for location privacy in location-based services," Computer Communications, vol. 31, no. 6, pp. 1181-1191, 2008.
    • (2008) Computer Communications , vol.31 , Issue.6 , pp. 1181-1191
    • Solanas, A.1    Martínez-Ballesté, A.2
  • 2
    • 58849100317 scopus 로고    scopus 로고
    • A flexible privacy-enhanced location-based services system framework and practice
    • Y. Sun, T. La Porta, and P. Kermani, "A flexible privacy-enhanced location-based services system framework and practice," Mobile Computing, IEEE Transactions on, vol. 8, no. 3, pp. 304-321, 2009.
    • (2009) Mobile Computing, IEEE Transactions on , vol.8 , Issue.3 , pp. 304-321
    • Sun, Y.1    La Porta, T.2    Kermani, P.3
  • 4
    • 65349103224 scopus 로고    scopus 로고
    • Attacking algorithms against continuous queries in lbs and anonymity measurement
    • X. Lin, S. Li, and Z. Yang, "Attacking algorithms against continuous queries in lbs and anonymity measurement," Ruan Jian Xue Bao(Journal of Software), vol. 20, no. 4, pp. 1058-1068, 2009.
    • (2009) Ruan Jian Xue Bao(Journal of Software) , vol.20 , Issue.4 , pp. 1058-1068
    • Lin, X.1    Li, S.2    Yang, Z.3
  • 9
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," Mobile Computing, IEEE Transactions on, vol. 7, no. 1, pp. 1-18, 2008.
    • (2008) Mobile Computing, IEEE Transactions on , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 10
    • 70350400229 scopus 로고    scopus 로고
    • Approximate evaluation of range nearest neighbor queries with quality guarantee
    • C. Chow, M. Mokbel, J. Naps, and S. Nath, "Approximate evaluation of range nearest neighbor queries with quality guarantee," Advances in Spatial and Temporal Databases, vol. 5644, pp. 283-301, 2009.
    • (2009) Advances in Spatial and Temporal Databases , vol.5644 , pp. 283-301
    • Chow, C.1    Mokbel, M.2    Naps, J.3    Nath, S.4
  • 15
    • 37849043178 scopus 로고    scopus 로고
    • Privacy protection in location-based services through a public-key privacy homomorphism
    • A. Solanas and A. Martínez-Ballesté, "Privacy protection in location-based services through a public-key privacy homomorphism," Public Key Infrastructure, vol. 4582, pp. 362-368, 2007.
    • (2007) Public Key Infrastructure , vol.4582 , pp. 362-368
    • Solanas, A.1    Martínez-Ballesté, A.2
  • 18
    • 51349083760 scopus 로고    scopus 로고
    • Exploring historical location data for anonymity preservation in location-based services
    • IEEE. IEEE
    • T. Xu and Y. Cai, "Exploring historical location data for anonymity preservation in location-based services," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008, pp. 547-555.
    • (2008) INFOCOM 2008. The 27th Conference on Computer Communications , pp. 547-555
    • Xu, T.1    Cai, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.