-
2
-
-
56749180636
-
Preventing profile generation in vehicular networks
-
Washington, DC, USA: IEEE Computer Society
-
F. Scheuer, K. Plößl, and H. Federrath, "Preventing profile generation in vehicular networks," in WIMOB '08: Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication. Washington, DC, USA: IEEE Computer Society, 2008, pp. 520-525.
-
(2008)
WIMOB '08: Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
, pp. 520-525
-
-
Scheuer, F.1
Plößl, K.2
Federrath, H.3
-
5
-
-
2942587015
-
Mix zones: User privacy in location-aware services
-
IEEE Computer Society
-
-, "Mix zones: User privacy in location-aware services," in 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA. IEEE Computer Society, 2004, pp. 127-131.
-
(2004)
2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA
, pp. 127-131
-
-
Beresford, A.R.1
Stajano, F.2
-
6
-
-
74949136373
-
Mix-Zones for Location Privacy in Vehicular Networks
-
J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J.-P. Hubaux, "Mix-Zones for Location Privacy in Vehicular Networks," in ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, 2007.
-
ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, 2007
-
-
Freudiger, J.1
Raya, M.2
Félegyházi, M.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
7
-
-
69949127837
-
On the Optimal Placement of Mix Zones
-
J. Freudiger, R. Shokri, and J.-P. Hubaux, "On the Optimal Placement of Mix Zones," in Privacy Enhancing Technologies Symposium (PETS), Seattle, 2009, pp. 216-234.
-
Privacy Enhancing Technologies Symposium (PETS), Seattle, 2009
, pp. 216-234
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.-P.3
-
8
-
-
76549124713
-
Wireless location privacy protection in vehicular ad-hoc networks
-
February
-
J.-H. Song, V. W. S. Wong, and V. C. M. Leung, "Wireless location privacy protection in vehicular ad-hoc networks," Mobile Networks and Applications, vol. 15, no. 1, pp. 160-171, February 2010.
-
(2010)
Mobile Networks and Applications
, vol.15
, Issue.1
, pp. 160-171
-
-
Song, J.-H.1
Wong, V.W.S.2
Leung, V.C.M.3
-
9
-
-
80052145930
-
Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs
-
Kyoto, Japan: IEEE, Juni 2011
-
R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs," in Proceedings of IEEE International Conference on Communications, ICC 2011. Kyoto, Japan: IEEE, Juni 2011, pp. 1-5.
-
Proceedings of IEEE International Conference on Communications, ICC 2011
, pp. 1-5
-
-
Lu, R.1
Lin, X.2
Luan, T.H.3
Liang, X.4
Shen, X.5
-
10
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in Proceedings of the 2005 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, March 2005, pp. 1187-1192.
-
Proceedings of the 2005 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, March 2005
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
11
-
-
33745840780
-
Silent cascade: Enhancing location privacy without communication qos degradation
-
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, ser. J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., Springer
-
L. Huang, H. Yamane, K. Matsuura, and K. Sezaki, "Silent cascade: Enhancing location privacy without communication qos degradation," in Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, ser. Lecture Notes in Computer Science, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., vol. 3934. Springer, 2006, pp. 165-180.
-
(2006)
Lecture Notes in Computer Science
, vol.3934
, pp. 165-180
-
-
Huang, L.1
Yamane, H.2
Matsuura, K.3
Sezaki, K.4
-
12
-
-
84885223558
-
Swing & swap: User-centric approaches towards maximizing location privacy
-
A. Juels and M. Winslett, Eds. ACM
-
M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, "Swing & swap: user-centric approaches towards maximizing location privacy," in Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, A. Juels and M. Winslett, Eds. ACM, 2006, pp. 19-28.
-
(2006)
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006
, pp. 19-28
-
-
Li, M.1
Sampigethaya, K.2
Huang, L.3
Poovendran, R.4
-
13
-
-
77951259549
-
SLOW: A practical pseudonym changing scheme for location privacy in VANETs
-
IEEE, October
-
L. Buttyán, T. Holczer, A. Weimerskirch, and W. Whyte, "SLOW: A practical pseudonym changing scheme for location privacy in VANETs," in Proceedings of the IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 2009. IEEE, October 2009.
-
(2009)
Proceedings of the IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 2009
-
-
Buttyán, L.1
Holczer, T.2
Weimerskirch, A.3
Whyte, W.4
-
14
-
-
76549108979
-
REP: Location privacy for VANETs using random encryption periods
-
Februar
-
A. Wasef and X. S. Shen, "REP: Location privacy for VANETs using random encryption periods," Mobile Networks and Applications, vol. 15, no. 1, pp. 172-185, Februar 2010.
-
(2010)
Mobile Networks and Applications
, vol.15
, Issue.1
, pp. 172-185
-
-
Wasef, A.1
Shen, X.S.2
-
16
-
-
0034239164
-
Congested traffic states in empirical observations and microscopic simulations
-
August
-
M. Treiber, A. Hennecke, and D. Helbing, "Congested traffic states in empirical observations and microscopic simulations," Physical Review E, vol. 62, pp. 1805-1824, August 2000.
-
(2000)
Physical Review E
, vol.62
, pp. 1805-1824
-
-
Treiber, M.1
Hennecke, A.2
Helbing, D.3
-
18
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
19
-
-
84856043672
-
A mathematical theory of communication
-
July
-
C. E. Shannon, "A mathematical theory of communication," The bell system technical journal, vol. 27, pp. 379-423, July 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
21
-
-
84957800033
-
Towards measuring anonymity
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Proceedings of the 2nd international conference on Privacy enhancing technologies, PET'02, 2003.
-
Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, PET'02, 2003
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
|