-
1
-
-
84898039479
-
Trajectory privacy preservation-an inevitable issue towards future mobile sensor networks
-
X. Jin and N. Pissinou, "Trajectory Privacy Preservation-An Inevitable Issue towards Future Mobile Sensor Networks," International Journal of Research and Reviews in Wireless Sensor Networks, vol. 2, no. 2, 2012.
-
International Journal of Research and Reviews in Wireless Sensor Networks
, vol.2
, Issue.2
, pp. 2012
-
-
Jin, X.1
Pissinou, N.2
-
2
-
-
74049097109
-
On non-cooperative location privacy: A game-theoretic analysis
-
J. Freudiger, M. H. Manshaei, J. P. Hubaux, and D. C. Parkes, "On Non-cooperative Location Privacy: A Game-theoretic Analysis," in ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS
-
-
Freudiger, J.1
Manshaei, M.H.2
Hubaux, J.P.3
Parkes, D.C.4
-
3
-
-
84872005309
-
Hiding trajectory on the fly
-
June
-
X. Jin, N. Pissinou, C. Chesneau, S. Pumpichet, and D. Pan, "Hiding Trajectory on the Fly," in Communications (ICC), 2012 IEEE Interna-tional Conference on, June 2012, pp. 403-407.
-
(2012)
Communications (ICC) 2012 IEEE Interna-tional Conference on
, pp. 403-407
-
-
Jin, X.1
Pissinou, N.2
Chesneau, C.3
Pumpichet, S.4
Pan, D.5
-
4
-
-
84869465300
-
Protecting location privacy: Optimal strategy against localization attacks
-
R. Shokri, G. Theodorakopoulos, C. Troncoso, J. P. Hubaux, and J. Y. Le Boudec, "Protecting Location Privacy: Optimal Strategy against Localization Attacks," in Proceedings of ACM conference on Computer and Communications Security, 2012, pp. 617-627.
-
(2012)
Proceedings of ACM conference on Computer and Communications Security
, pp. 617-627
-
-
Shokri, R.1
Theodorakopoulos, G.2
Troncoso, C.3
Hubaux, J.P.4
Le Boudec, J.Y.5
-
5
-
-
78650758460
-
Tracking games in mobile networks
-
T. Alpcan, L. Buttyan, and J. Baras, Eds. Springer Berlin Heidelberg
-
M. Humbert, M. Manshaei, J. Freudiger, and J. P. Hubaux, "Tracking Games in Mobile Networks," in Decision and Game Theory for Security, ser. Lecture Notes in Computer Science, T. Alpcan, L. Buttyan, and J. Baras, Eds. Springer Berlin Heidelberg, 2010, vol. 6442, pp. 38-57.
-
(2010)
Decision and Game Theory for Security, ser. Lecture Notes in Computer Science
, vol.6442
, pp. 38-57
-
-
Humbert, M.1
Manshaei, M.2
Freudiger, J.3
Hubaux, J.P.4
-
6
-
-
79953250057
-
Location privacy: Privacy, efficiency and recourse through a prohibitive contract
-
N. J. Croft and M. S. Olivier, "Location Privacy: Privacy, Efficiency and Recourse through A Prohibitive Contract," Transactions on Data Privacy, vol. 4, no. 1, pp. 19-30, 2011.
-
(2011)
Transactions on Data Privacy
, vol.4
, Issue.1
, pp. 19-30
-
-
Croft, N.J.1
Olivier, M.S.2
-
7
-
-
84898023752
-
Trading privacy with incentives in mobile commerce: A game theoretic approach
-
Aug
-
A. K. Chorppath and T. Alpcan, "Trading Privacy with Incentives in Mobile Commerce: A Game Theoretic Approach," Pervasive and Mobile Computing, Aug. 2012.
-
(2012)
Pervasive and Mobile Computing
-
-
Chorppath, A.K.1
Alpcan, T.2
-
8
-
-
84898048155
-
Collaborative location privacy with rational users
-
(GameSec
-
F. De Santos, M. Humbert, R. Shokri, and J. P. Hubaux, "Collaborative Location Privacy with Rational Users," in 2nd Conference on Decision and Game Theory for Security (GameSec), 2011.
-
(2011)
2nd Conference on Decision and Game Theory for Security
-
-
Santos De, F.1
Humbert, M.2
Shokri, R.3
Hubaux, J.P.4
-
9
-
-
80052141648
-
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
-
June
-
C. Kamhoua, N. Pissinou, and K. Makki, "Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-hop Networks: Application to Network Security and Privacy," in Communications (ICC), 2011 IEEE International Conference on, June 2011, pp. 1-6.
-
(2011)
Communications (ICC) 2011 IEEE International Conference on
, pp. 1-6
-
-
Kamhoua, C.1
Pissinou, N.2
Makki, K.3
-
10
-
-
70349994407
-
Coexistence with malicious nodes: A game theoretic approach
-
May
-
W. Wang, M. Chatterjee, and K. Kwiat, "Coexistence with Malicious Nodes: A Game Theoretic Approach," in Game Theory for Networks, 2009. GameNets '09. International Conference on, May 2009, pp. 277-286.
-
(2009)
Game Theory for Networks 2009. GameNets '09. International Conference on
, pp. 277-286
-
-
Wang, W.1
Chatterjee, M.2
Kwiat, K.3
|