메뉴 건너뛰기




Volumn , Issue , 2013, Pages 140-148

An adaptive privacy-preserving scheme for location tracking of a mobile user

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE CONTROL SYSTEMS; DATA PRIVACY; IMAGE MATCHING; LOCATION BASED SERVICES; TRACKING (POSITION);

EID: 84890886307     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2013.6644972     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 2
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • New York, NY, USA
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. in Proc. of MobiSys, New York, NY, USA, 2003, pp. 31-42
    • (2003) Proc. of MobiSys , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 3
    • 74049132493 scopus 로고    scopus 로고
    • Preventing velocity-based linkage attacks in location-Aware applications
    • G. Ghinita, M. L. Damiani, C. Silvestri, and E. Bertino. Preventing velocity-based linkage attacks in location-Aware applications. in Proc. of GIS, 2009, pp. 246-255
    • (2009) Proc. of GIS , pp. 246-255
    • Ghinita, G.1    Damiani, M.L.2    Silvestri, C.3    Bertino, E.4
  • 4
    • 67650302602 scopus 로고    scopus 로고
    • Realistic driving trips for location privacy
    • J. Krumm. Realistic driving trips for location privacy. in Proceedings of Pervasive Computing, 2009, pp. 25-41
    • (2009) Proceedings of Pervasive Computing , pp. 25-41
    • Krumm, J.1
  • 5
    • 33745725717 scopus 로고    scopus 로고
    • An anonymous communication technique using dummies for location-based services
    • july
    • H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services. in Proc. of ICPS' 05, july 2005, pp. 88-97
    • (2005) Proc. of ICPS' 05 , pp. 88-97
    • Kido, H.1    Yanagisawa, Y.2    Satoh, T.3
  • 6
  • 9
    • 77951104466 scopus 로고    scopus 로고
    • Privacypreserving reconstruction of multidimensional data maps in vehicular participatory sensing
    • N. Pham, R. K. Ganti, Y. S. Uddin, S. Nath, and T. Abdelzaher. Privacypreserving reconstruction of multidimensional data maps in vehicular participatory sensing. in Proc. of EWSN, 2010, pp. 114-130
    • (2010) Proc. of EWSN , pp. 114-130
    • Pham, N.1    Ganti, R.K.2    Uddin, Y.S.3    Nath, S.4    Abdelzaher, T.5
  • 10
    • 79961057817 scopus 로고    scopus 로고
    • Energy-efficient positioning for smartphones using cell-id sequence matching
    • J. Paek, K-H. Kim, J. Singh, and R. Govindan. Energy-efficient positioning for smartphones using cell-id sequence matching. in ACM MobiSys '11:, 2011
    • (2011) ACM MobiSys '11
    • Paek, J.1    Kim, K.-H.2    Singh, J.3    Govindan, R.4
  • 11
  • 12
  • 13
    • 84890861410 scopus 로고    scopus 로고
    • Jahmm. https://code.google.com/p/jahmm/
    • Jahmm
  • 14
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • feb
    • L. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, feb 1989
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 15
    • 38049035427 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • J. Krumm. Inference attacks on location tracks. in Proceedings of, ser. PERVASIVE'07, 2007, pp. 127-143
    • (2007) Proceedings Of, Ser. PERVASIVE'07 , pp. 127-143
    • Krumm, J.1
  • 16
    • 84863294412 scopus 로고    scopus 로고
    • Privacy protection for users of location-based services
    • K. G. Shin, X. Ju, Z. Chen, and X. Hu. Privacy Protection for Users of Location-Based Services. IEEE Wireless Communication, vol. 19, no. 1, pp. 30-39, 2012
    • (2012) IEEE Wireless Communication , vol.19 , Issue.1 , pp. 30-339
    • Shin, K.G.1    Ju, X.2    Chen, Z.3    Hu, X.4
  • 17
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • Aug
    • J. Krumm. A survey of computational location privacy. Personal Ubiquitous Comput., vol. 13, no. 6, pp. 391-399, Aug. 2009
    • (2009) Personal Ubiquitous Comput , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 19
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. in Proceedings of, ser. PERVASIVE'05, 2005, pp. 152-170
    • (2005) Proceedings Of, Ser. PERVASIVE'05 , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 20
  • 21
    • 80054065916 scopus 로고    scopus 로고
    • Fine-grained cloaking of sensitive positions in location-sharing applications
    • aril
    • M. Damiani, C. Silvestri, and E. Bertino. Fine-grained cloaking of sensitive positions in location-sharing applications. Pervasive Computing, IEEE, vol. 10, no. 4, pp. 64-72, april 2011
    • (2011) Pervasive Computing IEEE , vol.10 , Issue.4 , pp. 64-72
    • Damiani, M.1    Silvestri, C.2    Bertino, E.3
  • 22
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • jan-mar
    • A. Beresford and F. Stajano. Location privacy in pervasive computing. Pervasive Computing, IEEE, vol. 2, no. 1, pp. 46-55, jan-mar 2003
    • (2003) Pervasive Computing IEEE , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 23
    • 68149139701 scopus 로고    scopus 로고
    • Location diversity: Enhanced privacy protection in location based services
    • M. Xue, P. Kalnis, and H. K. Pung. Location diversity: Enhanced privacy protection in location based services. in Proceedings of, ser. LoCA '09, 2009, pp. 70-87
    • (2009) Proceedings of Ser. LoCA '09 , pp. 70-87
    • Xue, M.1    Kalnis, P.2    Pung, H.K.3
  • 25
    • 2342562393 scopus 로고    scopus 로고
    • Protecting privacy, in continuous locationtracking applications
    • mar-Apr
    • M. Gruteser and X. Liu. Protecting privacy, in continuous locationtracking applications. Security Privacy, IEEE, vol. 2, no. 2, pp. 28-34, mar-Apr 2004
    • (2004) Security Privacy IEEE , vol.2 , Issue.2 , pp. 28-34
    • Gruteser, M.1    Liu, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.