-
2
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with privacygrid
-
B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting anonymous location queries in mobile environments with privacygrid," in WWW, 2008, pp. 237-246.
-
(2008)
WWW
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
4
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption," in CRYPTO, 2007, pp. 535-552.
-
(2007)
CRYPTO
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'neill, A.3
-
5
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in EUROCRYPT, 2004, pp. 506-522.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
78650021967
-
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
-
D. Boneh, H. W. Montgomery, and A. Raghunathan, "Algebraic pseudorandom functions with improved efficiency from the augmented cascade," in ACM CCS, 2010, pp. 131-140.
-
(2010)
ACM CCS
, pp. 131-140
-
-
Boneh, D.1
Montgomery, H.W.2
Raghunathan, A.3
-
7
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in TCC, 2007, pp. 535-554.
-
(2007)
TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
8
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in ACNS, 2005, pp. 442-455.
-
(2005)
ACNS
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
9
-
-
79960886232
-
Secure group key management using uni-directional proxy re-encryption schemes
-
Y.-R. Chen, J. D. Tygar, and W.-G. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes," in INFOCOM, 2011, pp. 1952-1960.
-
(2011)
INFOCOM
, pp. 1952-1960
-
-
Chen, Y.-R.1
Tygar, J.D.2
Tzeng, W.-G.3
-
10
-
-
84883124401
-
-
Crypto++
-
Crypto++, http://www.cryptopp.com/, 2010.
-
(2010)
-
-
-
11
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in ACM CCS, 2006, pp. 79-88.
-
(2006)
ACM CCS
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
12
-
-
84883105646
-
-
foursquare
-
foursquare, http://blog.foursquare.com/2010/07/01/755614816/, 2010.
-
(2010)
-
-
-
13
-
-
84857073828
-
Evaluating the privacy risk of location-based services
-
J. Freudiger, R. Shokri, and J.-P. Hubaux, "Evaluating the privacy risk of location-based services," in Financial Cryptography, 2011, pp. 31-46.
-
(2011)
Financial Cryptography
, pp. 31-46
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.-P.3
-
14
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: anonymizers are not necessary," in SIGMOD Conference, 2008, pp. 121-132.
-
(2008)
SIGMOD Conference
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
16
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in MobiSys, 2003.
-
(2003)
MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
17
-
-
48649106117
-
Hiding location information from location-based services
-
U. Hengartner, "Hiding location information from location-based services," in MDM, 2007, pp. 268-272.
-
(2007)
MDM
, pp. 268-272
-
-
Hengartner, U.1
-
18
-
-
77958056561
-
Fast secure computation of set intersection
-
S. Jarecki and X. Liu, "Fast secure computation of set intersection," in SCN, 2010, pp. 418-435.
-
(2010)
SCN
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
20
-
-
37849018331
-
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
-
A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in SSTD, 2007, pp. 239-257.
-
(2007)
SSTD
, pp. 239-257
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
21
-
-
79951509728
-
Location privacy: Going beyond k-anonymity, cloaking and anonymizers
-
A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, "Location privacy: going beyond k-anonymity, cloaking and anonymizers," Knowl. Inf. Syst., vol. 26, no. 3, pp. 435-465, 2011.
-
(2011)
Knowl. Inf. Syst
, vol.26
, Issue.3
, pp. 435-465
-
-
Khoshgozaran, A.1
Shahabi, C.2
Shirani-Mehr, H.3
-
22
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The new casper: Query processing for location services without compromising privacy," in VLDB, 2006, pp. 763-774.
-
(2006)
VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
23
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D.Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
24
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, and K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," in INFOCOM, 2012, pp. 451-459.
-
(2012)
INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
25
-
-
52649118020
-
Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services," in ICDE, 2008, pp. 366-375.
-
(2008)
ICDE
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
|