-
1
-
-
29844444250
-
Incognito: Efficient Full-Domain k- Anonymity
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient Full-Domain k- Anonymity. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49-60 (2005)
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
2
-
-
33749606641
-
Mondrian Multidimensional K-Anonymity
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian Multidimensional K-Anonymity. In: Proceedings of the 22nd International Conference in Data Engineering, p. 25 (2006)
-
(2006)
Proceedings of the 22nd International Conference in Data Engineering
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
3
-
-
0035517699
-
Protecting Respondents' Identities in Microdata Release
-
Samarati, P.: Protecting Respondents' Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010-1027 (2001)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
4
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, pp. 31-42 (2003)
-
(2003)
Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
5
-
-
36549043405
-
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
-
Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1), 1-18 (2008)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
6
-
-
35648982949
-
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
-
Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719-1733 (2007)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
7
-
-
33749607006
-
ℓ-Diversity: Privacy Beyond k-Anonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, p. 24 (2006)
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
8
-
-
34548805858
-
T-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity. In: Proceedings of the 23rd International Conference on Data Engineering, pp. 106-115 (2007)
-
(2007)
Proceedings of the 23rd International Conference on Data Engineering
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
9
-
-
85011016303
-
Minimality Attack in Privacy Preserving Data Publishing
-
Wong, R.C., Fu, A.W., Wang, K., Pei, J.: Minimality Attack in Privacy Preserving Data Publishing. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 543-554 (2007)
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 543-554
-
-
Wong, R.C.1
Fu, A.W.2
Wang, K.3
Pei, J.4
-
10
-
-
33746335051
-
Differential Privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
11
-
-
57349191501
-
Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid
-
Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid. In: Proceedings of the 17th International World Wide Web Conference, pp. 237-246 (2008)
-
(2008)
Proceedings of the 17th International World Wide Web Conference
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
12
-
-
68149139701
-
Location Diversity: Enhanced Privacy Protection in Location Based Services
-
Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. Springer, Heidelberg
-
Xue, M., Kalnis, P., Pung, H.K.: Location Diversity: Enhanced Privacy Protection in Location Based Services. In: Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. LNCS, vol. 5561, pp. 70-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5561
, pp. 70-87
-
-
Xue, M.1
Kalnis, P.2
Pung, H.K.3
-
13
-
-
73049087402
-
A Reciprocal Framework for Spatial k-Anonymity
-
Ghinita, G., Zhao, K., Papadias, D., Kalnis, P.: A Reciprocal Framework for Spatial k-Anonymity. Journal of Information Systems 35(3), 299-314 (2010)
-
(2010)
Journal of Information Systems
, vol.35
, Issue.3
, pp. 299-314
-
-
Ghinita, G.1
Zhao, K.2
Papadias, D.3
Kalnis, P.4
-
14
-
-
37849018331
-
Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy
-
Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. Springer, Heidelberg
-
Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239-257. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4605
, pp. 239-257
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
15
-
-
0030420818
-
Encoding and Decoding the Hilbert Order
-
Liu, X., Schrack, G.: Encoding and Decoding the Hilbert Order. Software-Practice and Experience 26(12), 1335-1346 (1996)
-
(1996)
Software-Practice and Experience
, vol.26
, Issue.12
, pp. 1335-1346
-
-
Liu, X.1
Schrack, G.2
-
16
-
-
33745725717
-
An Anonymous Communication Technique Using Dummies for Location-Based Services
-
Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique Using Dummies for Location-Based Services. In: Proceedings of the IEEE International Conference on Pervasive Services, pp. 88-97 (2005)
-
(2005)
Proceedings of the IEEE International Conference on Pervasive Services
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
17
-
-
24944432404
-
A Formal Model of Obfuscation and Negotiation for Location Privacy
-
Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. Springer, Heidelberg
-
Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152-170. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
18
-
-
66549090154
-
Preserving User Location Privacy in Mobile Data Management Infrastructures
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393-412. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 393-412
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
19
-
-
52649118020
-
SpaceTwist: Managing the Trade-Offs among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
-
Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: Proceedings of the 24th International Conference on Data Engineering, pp. 366-375 (2008)
-
(2008)
Proceedings of the 24th International Conference on Data Engineering
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
-
20
-
-
35348924316
-
PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems
-
Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems. In: Proceedings of the 16th International Conference on World Wide Web, pp. 371-380 (2007)
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 371-380
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
21
-
-
34547720006
-
The New Casper: Query Processing for Location Services Without Compromising Privacy
-
Mokbel, M.F., Chow, C., Aref, W.G.: The New Casper: Query Processing for Location Services Without Compromising Privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763-774 (2006)
-
(2006)
Proceedings of the 32nd International Conference on Very Large Data Bases
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.2
Aref, W.G.3
-
22
-
-
67649723391
-
OPAQUE: Protecting Path Privacy in Directions Search
-
Lee, K.C.K., Lee, W.C., Leong, H.V., Zheng, B.: OPAQUE: Protecting Path Privacy in Directions Search. In: Proceedings of the 25th International Conference on Data Engineering, pp. 1271-1274 (2009)
-
(2009)
Proceedings of the 25th International Conference on Data Engineering
, pp. 1271-1274
-
-
Lee, K.C.K.1
Lee, W.C.2
Leong, H.V.3
Zheng, B.4
-
24
-
-
78650862555
-
Time Warp: How Time Affects Privacy in LBSs
-
Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
-
Marconi, L., Di Pietro, R., Crispo, B., Conti, M.: Time Warp: How Time Affects Privacy in LBSs. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 325-339. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6476
, pp. 325-339
-
-
Marconi, L.1
Di Pietro, R.2
Crispo, B.3
Conti, M.4
-
25
-
-
80051968910
-
Quantifying Location Privacy
-
Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying Location Privacy. In: Proceedings of the 32nd IEEE Symposium on Security and Privacy, pp. 247-262 (2011)
-
(2011)
Proceedings of the 32nd IEEE Symposium on Security and Privacy
, pp. 247-262
-
-
Shokri, R.1
Theodorakopoulos, G.2
Boudec, J.Y.L.3
Hubaux, J.P.4
-
26
-
-
3142716056
-
Order Preserving Encryption for Numeric Data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563-574 (2004)
-
(2004)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
27
-
-
70849131456
-
Secure kNN Computation on Encrypted Databases
-
Wong, W.K., Cheung, D.W., Kao, B., Mamouslis, N.: Secure kNN Computation on Encrypted Databases. In: Proceedings of the 35th SIGMOD International Conference on Management of Data, pp. 139-152 (2009)
-
(2009)
Proceedings of the 35th SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamouslis, N.4
-
28
-
-
79951509728
-
Location Privacy: Going beyond k-Anonymity, Cloaking and Anonymizers
-
Khoshgozaran, A., Shahabi, C., Shirani-Mehr, H.: Location Privacy: Going beyond k-Anonymity, Cloaking and Anonymizers. Journal of Knowledge and Information Systems 26(3), 435-465 (2011)
-
(2011)
Journal of Knowledge and Information Systems
, vol.26
, Issue.3
, pp. 435-465
-
-
Khoshgozaran, A.1
Shahabi, C.2
Shirani-Mehr, H.3
-
29
-
-
79955911586
-
Nearest Neighbor Search with Strong Location Privacy
-
Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest Neighbor Search with Strong Location Privacy. VLDB Endowment 3(1-2), 619-629 (2010)
-
(2010)
VLDB Endowment
, vol.3
, Issue.1-2
, pp. 619-629
-
-
Papadopoulos, S.1
Bakiras, S.2
Papadias, D.3
|