-
1
-
-
0041783510
-
Privacy-preserving data mining
-
May
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," SIGMOD Rec., vol. 29, no. 2, pp. 439-450, May 2000. [Online]. Available: http://doi. acm. org/10. 1145/335191. 335438
-
(2000)
SIGMOD Rec.
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Springer
-
M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy," in Pervasive computing. Springer, 2005, pp. 152-170.
-
(2005)
Pervasive Computing
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
4
-
-
84873341001
-
A review of mobile location privacy in the internet of things
-
M. Elkhodr, S. Shahrestani, and H. Cheung, "A review of mobile location privacy in the internet of things," in 2012 10th International Conference on ICT and Knowledge Engineering, (ICT Knowledge Engineering), 2012, pp. 266-272.
-
(2012)
2012 10th International Conference on ICT and Knowledge Engineering, (ICT Knowledge Engineering)
, pp. 266-272
-
-
Elkhodr, M.1
Shahrestani, S.2
Cheung, H.3
-
6
-
-
84898774385
-
Enhancing data privacy and access anonymity in cloud computing
-
N. Giweli, S. Shahrestani, and H. Cheung, "Enhancing data privacy and access anonymity in cloud computing," Communications of the IBIMA, vol. 1, no. 462966, 2013.
-
(2013)
Communications of the IBIMA
, vol.1
, pp. 462966
-
-
Giweli, N.1
Shahrestani, S.2
Cheung, H.3
-
7
-
-
35048866963
-
A methodological assessment of location privacy risks in wireless hotspot networks
-
Springer
-
M. Gruteser and D. Grunwald, "A methodological assessment of location privacy risks in wireless hotspot networks," in Security in pervasive computing. Springer, 2004, pp. 10-24.
-
(2004)
Security in Pervasive Computing
, pp. 10-24
-
-
Gruteser, M.1
Grunwald, D.2
-
8
-
-
84862170370
-
Open data: An international comparison of strategies
-
N. Huijboom and T. Van den Broek, "Open data: an international comparison of strategies," European journal of ePractice, vol. 12, no. 1, pp. 1-13, 2011.
-
(2011)
European Journal of EPractice
, vol.12
, Issue.1
, pp. 1-13
-
-
Huijboom, N.1
Broek Den T.Van2
-
9
-
-
78650615555
-
Privacy and location anonymization in location-based services
-
L. Liu, "Privacy and location anonymization in location-based services," SIGSPATIAL Special, vol. 1, no. 2, pp. 15-22, 2009.
-
(2009)
SIGSPATIAL Special
, vol.1
, Issue.2
, pp. 15-22
-
-
Liu, L.1
-
10
-
-
78650880242
-
Anonymizing user location and profile information for privacy-aware mobile services
-
New York, NY, USA: ACM
-
M. Mano and Y. Ishikawa, "Anonymizing user location and profile information for privacy-aware mobile services," in Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks, ser. LBSN '10. New York, NY, USA: ACM, 2010, pp. 68-75. [Online]. Available: http://doi. acm. org/10. 1145/1867699. 1867712
-
(2010)
Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks, Ser. LBSN '10
, pp. 68-75
-
-
Mano, M.1
Ishikawa, Y.2
-
12
-
-
0028496909
-
Disseminating active map information to mobile hosts
-
B. Schilit and M. Theimer, "Disseminating active map information to mobile hosts," Network, IEEE, vol. 8, no. 5, pp. 22-32, 1994.
-
(1994)
Network, IEEE
, vol.8
, Issue.5
, pp. 22-32
-
-
Schilit, B.1
Theimer, M.2
|