메뉴 건너뛰기




Volumn , Issue , 2012, Pages 514-517

Location privacy attacks based on distance and density information

Author keywords

distance preserving transformations; location privacy; proximity based services

Indexed keywords

LOCATION PRIVACY; MOVING OBJECTS; PARTIAL DISTANCE; PARTIAL INFORMATION; PRIVACY PRESERVING; PROXIMITY SERVICE; PROXIMITY-BASED SERVICE; PUBLIC KNOWLEDGE;

EID: 84872760071     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2424321.2424403     Document Type: Conference Paper
Times cited : (4)

References (11)
  • 1
    • 84986221938 scopus 로고    scopus 로고
    • Privacy in Location-Based Applications
    • Springer
    • C. Bettini, S. Jajodia, P. Samarati, and X. S. Wang. Privacy in Location-Based Applications, volume 5599 of LNSC. Springer, 2009.
    • (2009) LNSC , vol.5599
    • Bettini, C.1    Jajodia, S.2    Samarati, P.3    Wang, X.S.4
  • 2
    • 33645226860 scopus 로고    scopus 로고
    • C. U. Center for International Earth Science Information Network (CIESIN) and C. I. de Agricultura Tropical (CIAT) version 3 (gpwv3)
    • C. U. Center for International Earth Science Information Network (CIESIN) and C. I. de Agricultura Tropical (CIAT). Gridded population of the world, version 3 (gpwv3), 2005.
    • (2005) Gridded Population of the World
  • 3
    • 77951602707 scopus 로고    scopus 로고
    • Private queries and trajectory anonymization: A dual perspective on location privacy
    • Apr.
    • G. Ghinita. Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Privacy, 2(1):3-19, Apr. 2009.
    • (2009) Trans. Data Privacy , vol.2 , Issue.1 , pp. 3-19
    • Ghinita, G.1
  • 6
    • 70349884221 scopus 로고    scopus 로고
    • Longitude: Centralized privacy-preserving computation of users' proximity
    • Proc. of 6th VLDB workshop on Secure Data Management, Springer
    • S. Mascetti, C. Bettini, and D. Freni. Longitude: Centralized privacy-preserving computation of users' proximity. In Proc. of 6th VLDB workshop on Secure Data Management, LNCS. Springer, 2009.
    • (2009) LNCS
    • Mascetti, S.1    Bettini, C.2    Freni, D.3
  • 7
    • 0002663098 scopus 로고
    • SLINK: An optimally efficient algorithm for the single-link cluster method
    • R. Sibson. SLINK: an optimally efficient algorithm for the single-link cluster method. The Computer Journal, 16(1):30-34, 1973.
    • (1973) The Computer Journal , vol.16 , Issue.1 , pp. 30-34
    • Sibson, R.1
  • 9
    • 70350371072 scopus 로고    scopus 로고
    • A location privacy aware friend locator
    • Proc. of the 11th Int. Symposium on Spatial and Temporal Databases, Springer
    • L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In Proc. of the 11th Int. Symposium on Spatial and Temporal Databases, volume 5644 of LNCS. Springer, 2009.
    • (2009) LNCS , vol.5644
    • Šikšnys, L.1    Thomsen, J.R.2    Šaltenis, S.3    Yiu, M.L.4    Andersen, O.5
  • 11
    • 38149079700 scopus 로고    scopus 로고
    • Louis, Lester and Pierre: Three protocols for location privacy
    • Privacy Enhancing Technologies, Springer
    • G. Zhong, I. Goldberg, and U. Hengartner. Louis, Lester and Pierre: Three protocols for location privacy. In Privacy Enhancing Technologies, volume 4776 of LNSC, pages 62-76. Springer, 2007.
    • (2007) LNSC , vol.4776 , pp. 62-76
    • Zhong, G.1    Goldberg, I.2    Hengartner, U.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.