-
1
-
-
84986221938
-
Privacy in Location-Based Applications
-
Springer
-
C. Bettini, S. Jajodia, P. Samarati, and X. S. Wang. Privacy in Location-Based Applications, volume 5599 of LNSC. Springer, 2009.
-
(2009)
LNSC
, vol.5599
-
-
Bettini, C.1
Jajodia, S.2
Samarati, P.3
Wang, X.S.4
-
2
-
-
33645226860
-
-
C. U. Center for International Earth Science Information Network (CIESIN) and C. I. de Agricultura Tropical (CIAT) version 3 (gpwv3)
-
C. U. Center for International Earth Science Information Network (CIESIN) and C. I. de Agricultura Tropical (CIAT). Gridded population of the world, version 3 (gpwv3), 2005.
-
(2005)
Gridded Population of the World
-
-
-
3
-
-
77951602707
-
Private queries and trajectory anonymization: A dual perspective on location privacy
-
Apr.
-
G. Ghinita. Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Privacy, 2(1):3-19, Apr. 2009.
-
(2009)
Trans. Data Privacy
, vol.2
, Issue.1
, pp. 3-19
-
-
Ghinita, G.1
-
4
-
-
78650588629
-
Privacy-preserving matching of spatial datasets with protection against background knowledge
-
ACM
-
G. Ghinita, C. R. Vicente, N. Shang, and E. Bertino. Privacy-preserving matching of spatial datasets with protection against background knowledge. In Proc. of the 18th SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems, GIS '10. ACM, 2010.
-
(2010)
Proc. of the 18th SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems, GIS '10
-
-
Ghinita, G.1
Vicente, C.R.2
Shang, N.3
Bertino, E.4
-
6
-
-
70349884221
-
Longitude: Centralized privacy-preserving computation of users' proximity
-
Proc. of 6th VLDB workshop on Secure Data Management, Springer
-
S. Mascetti, C. Bettini, and D. Freni. Longitude: Centralized privacy-preserving computation of users' proximity. In Proc. of 6th VLDB workshop on Secure Data Management, LNCS. Springer, 2009.
-
(2009)
LNCS
-
-
Mascetti, S.1
Bettini, C.2
Freni, D.3
-
7
-
-
0002663098
-
SLINK: An optimally efficient algorithm for the single-link cluster method
-
R. Sibson. SLINK: an optimally efficient algorithm for the single-link cluster method. The Computer Journal, 16(1):30-34, 1973.
-
(1973)
The Computer Journal
, vol.16
, Issue.1
, pp. 30-34
-
-
Sibson, R.1
-
9
-
-
70350371072
-
A location privacy aware friend locator
-
Proc. of the 11th Int. Symposium on Spatial and Temporal Databases, Springer
-
L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In Proc. of the 11th Int. Symposium on Spatial and Temporal Databases, volume 5644 of LNCS. Springer, 2009.
-
(2009)
LNCS
, vol.5644
-
-
Šikšnys, L.1
Thomsen, J.R.2
Šaltenis, S.3
Yiu, M.L.4
Andersen, O.5
-
10
-
-
70849131456
-
Secure knn computation on encrypted databases
-
ACM
-
W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In Proc. of the 2009 ACM SIGMOD Int. Conf. on Management of data, SIGMOD '09, pages 139-152. ACM, 2009.
-
(2009)
Proc. of the 2009 ACM SIGMOD Int. Conf. on Management of Data, SIGMOD '09
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-l.2
Kao, B.3
Mamoulis, N.4
-
11
-
-
38149079700
-
Louis, Lester and Pierre: Three protocols for location privacy
-
Privacy Enhancing Technologies, Springer
-
G. Zhong, I. Goldberg, and U. Hengartner. Louis, Lester and Pierre: Three protocols for location privacy. In Privacy Enhancing Technologies, volume 4776 of LNSC, pages 62-76. Springer, 2007.
-
(2007)
LNSC
, vol.4776
, pp. 62-76
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
|