메뉴 건너뛰기




Volumn , Issue , 2013, Pages 835-842

Modeling cooperative, selfish and malicious behaviors for trajectory privacy preservation using Bayesian game theory

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK ARCHITECTURE; SENSOR NODES; TRAJECTORIES;

EID: 84898021102     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2013.6761339     Document Type: Conference Paper
Times cited : (13)

References (15)
  • 6
    • 79953250057 scopus 로고    scopus 로고
    • Location privacy: Privacy, efficiency and recourse through a prohibitive contract
    • N. J. Croft and M. S. Olivier, "Location Privacy: Privacy, Efficiency and Recourse through A Prohibitive Contract," Transactions on Data Privacy, vol. 4, no. 1, pp. 19-30, 2011.
    • (2011) Transactions on Data Privacy , vol.4 , Issue.1 , pp. 19-30
    • Croft, N.J.1    Olivier, M.S.2
  • 7
    • 84898023752 scopus 로고    scopus 로고
    • Trading privacy with incentives in mobile commerce: A game theoretic approach
    • Aug
    • A. K. Chorppath and T. Alpcan, "Trading Privacy with Incentives in Mobile Commerce: A Game Theoretic Approach," Pervasive and Mobile Computing, Aug. 2012.
    • (2012) Pervasive and Mobile Computing
    • Chorppath, A.K.1    Alpcan, T.2
  • 9
    • 80052141648 scopus 로고    scopus 로고
    • Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
    • June
    • C. Kamhoua, N. Pissinou, and K. Makki, "Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-hop Networks: Application to Network Security and Privacy," in Communications (ICC), 2011 IEEE International Conference on, June 2011, pp. 1-6.
    • (2011) Communications (ICC) 2011 IEEE International Conference on , pp. 1-6
    • Kamhoua, C.1    Pissinou, N.2    Makki, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.