-
1
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Washington, DC, USA. [Online]
-
A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets," in Proc. 2008 IEEE Symposium on Security and Privacy, Washington, DC, USA. [Online]. Available: http://dx.doi.org/10.1109/SP.2008.33
-
Proc. 2008 IEEE Symposium on Security and Privacy
-
-
Narayanan, A.1
Shmatikov, V.2
-
2
-
-
84875822474
-
Unique in the crowd: The privacy bounds of human mobility
-
Mar., [Online]
-
Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, "Unique in the Crowd: The privacy bounds of human mobility," Scientific Reports, vol. 3, Mar. 2013. [Online]. Available: http://dx.doi.org/ 10.1038/srep01376
-
(2013)
Scientific Reports
, vol.3
-
-
De Montjoye, Y.-A.1
Hidalgo, C.A.2
Verleysen, M.3
Blondel, V.D.4
-
3
-
-
0024627211
-
Asymptotically optimal classification for multiple tests with empirically observed statistics
-
M. Gutman, "Asymptotically optimal classification for multiple tests with empirically observed statistics," IEEE Transactions on Informa- tion Theory, vol. 35, no. 2, pp. 401-408, 1989.
-
(1989)
IEEE Transactions on Informa- Tion Theory
, vol.35
, Issue.2
, pp. 401-408
-
-
Gutman, M.1
-
4
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
L. Sweeney, "Weaving technology and policy together to maintain confidentiality," The Journal of Law, Medicine &Ethics, vol. 25, no. 2-3, pp. 98-110, 1997.
-
(1997)
The Journal of Law, Medicine ðics
, vol.25
, Issue.2-3
, pp. 98-110
-
-
Sweeney, L.1
-
5
-
-
78650620310
-
Finding similar users using category-based location history
-
X. Xiao, Y. Zheng, Q. Luo, and X. Xie, "Finding similar users using category-based location history," in Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 2010, pp. 442-445.
-
(2010)
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM
, pp. 442-445
-
-
Xiao, X.1
Zheng, Y.2
Luo, Q.3
Xie, X.4
-
6
-
-
78649253198
-
Privacy vulnerability of published anonymous mobility traces
-
C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao, "Privacy vulnerability of published anonymous mobility traces," in Proceedings of the sixteenth annual international conference on Mobile computing and networking. ACM, 2010, pp. 185-196.
-
(2010)
Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking. ACM
, pp. 185-196
-
-
Ma, C.Y.1
Yau, D.K.2
Yip, N.K.3
Rao, N.S.4
-
7
-
-
84857073828
-
Evaluating the privacy risk of location-based services
-
Springer
-
J. Freudiger, R. Shokri, and J.-P. Hubaux, "Evaluating the privacy risk of location-based services," in Financial Cryptography and Data Security. Springer, 2012, pp. 31-46.
-
(2012)
Financial Cryptography and Data Security
, pp. 31-46
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.-P.3
-
8
-
-
84893461741
-
De-anonymization attack on geolocated datasets
-
Melbourne, Australie, Jul., [Online]
-
S. Gambs, M.-O. Killijian, and M. Nunez Del Prado Cortez, "De-anonymization attack on geolocated datasets," in Proceedings of the The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom- 13), Melbourne, Australie, Jul. 2013, p. 9p. [Online]. Available: http://hal.archives-ouvertes.fr/hal-00718763
-
(2013)
Proceedings of the the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom- 13)
-
-
Gambs, S.1
Killijian, M.-O.2
Del Prado Cortez, M.N.3
-
9
-
-
70349337434
-
Identification via location-profiling in gsm networks
-
Y. De Mulder, G. Danezis, L. Batina, and B. Preneel, "Identification via location-profiling in gsm networks," in Proceedings of the 7th ACM workshop on Privacy in the electronic society. ACM, 2008, pp. 23-32.
-
(2008)
Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society. ACM
, pp. 23-32
-
-
De Mulder, Y.1
Danezis, G.2
Batina, L.3
Preneel, B.4
|