-
1
-
-
0016994626
-
Efficient generation of the binary reflected gray code and its applications
-
Sept
-
J. R. Bitner, G. Ehrlich, and E. M. Reingold. Efficient generation of the binary reflected gray code and its applications. Commun. ACM, 19(9):517-521, Sept. 1976.
-
(1976)
Commun ACM
, vol.19
, Issue.9
, pp. 517-521
-
-
Bitner, J.R.1
Ehrlich, G.2
Reingold, E.M.3
-
3
-
-
35048892905
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In EUROCRYPT 2004, volume 3027 of LNCS, 2003.
-
(2003)
EUROCRYPT 2004, Volume 3027 of LNCS
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
5
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006, volume 4004 of LNCS, pages 573-592, 2006.
-
(2006)
EUROCRYPT 2006, Volume 4004 of LNCS
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
7
-
-
0036606530
-
A framework for generating network-based moving objects
-
T. Brinkhoff. A Framework for Generating Network-based Moving Objects. GeoInformatica, 6(2):153-180, 2002.
-
(2002)
GeoInformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
-
9
-
-
37849011436
-
Enabling private continuous queries for revealed user locations
-
C.-Y. Chow and M. F. Mokbel. Enabling Private Continuous Queries for Revealed User Locations. In SSTD, pages 258-275, 2007.
-
(2007)
SSTD
, pp. 258-275
-
-
Chow, C.-Y.1
Mokbel, M.F.2
-
10
-
-
84864197091
-
Differentially private spatial decompositions
-
G. Cormode, C. Procopiuc, E. Shen, D. Srivastava, and T. Yu. Differentially private spatial decompositions. In ICDE, pages 20-31, 2012.
-
(2012)
ICDE
, pp. 20-31
-
-
Cormode, G.1
Procopiuc, C.2
Shen, E.3
Srivastava, D.4
Yu, T.5
-
12
-
-
77951688595
-
Differential privacy in new settings
-
C. Dwork. Differential privacy in new settings. In SODA, pages 174-183, 2010.
-
(2010)
SODA
, pp. 174-183
-
-
Dwork, C.1
-
13
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In Proc. of ICDCS, pages 620-629, 2005.
-
(2005)
Proc. of ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
15
-
-
36549043405
-
Protecting location privacy with personalized k-Anonymity: Architecture and algorithms
-
B. Gedik and L. Liu. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE TMC, 7(1):1-18, 2008.
-
(2008)
IEEE TMC
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
16
-
-
57149129292
-
-
Private queries in location based services: anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. In Proceedings of International Conference on Management of Data (ACM SIGMOD), 2008.
-
(2008)
Proceedings of International Conference on Management of Data ACM SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.L.5
-
17
-
-
35348924316
-
PRIVE: Anonymous location-based queries in distributed mobile systems
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems. In WWW, 2007.
-
(2007)
WWW
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
19
-
-
1642286258
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In USENIX MobiSys, 2003.
-
(2003)
USENIX MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
20
-
-
2342562393
-
Protecting privacy in continuous location-tracking applications
-
M. Gruteser and X. Liu. Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy, 2:28-34, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
21
-
-
35648982949
-
Preserving location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preserving Location-based Identity Inference in Anonymous Spatial Queries. IEEE TKDE, 19(12), 2007.
-
(2007)
IEEE TKDE
, vol.19
, pp. 12
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
22
-
-
57149125534
-
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
-
A. Khoshgozaran and C. Shahabi. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In SSTD, 2007.
-
(2007)
SSTD
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
24
-
-
84858038683
-
Secure and privacy preserving keyword searching for cloud storage services
-
May
-
Q. Liu, G. Wang, and J. Wu. Secure and privacy preserving keyword searching for cloud storage services. J. Network Computing Applications, 35(3):927-933, May 2012.
-
(2012)
J. Network Computing Applications
, vol.35
, Issue.3
, pp. 927-933
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
26
-
-
0027277648
-
Espresso-signature: A new exact minimizer for logic functions
-
P. McGeer, J. Sanghavi, R. Brayton, and A. S. Vincentelli. Espresso-signature: a new exact minimizer for logic functions. In Proceedings of the 30th international Design Automation Conference, pages 618-624, 1993.
-
(1993)
Proceedings of the 30th International Design Automation Conference
, pp. 618-624
-
-
McGeer, P.1
Sanghavi, J.2
Brayton, R.3
Vincentelli, A.S.4
-
27
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
Sept
-
V. S. Miller. The weil pairing, and its efficient calculation. J. Cryptol., 17(4):235-261, Sept. 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.S.1
-
28
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. In VLDB, 2006.
-
(2006)
VLDB
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
29
-
-
0021644214
-
The quadtree and related hierarchical data structures
-
June
-
H. Samet. The quadtree and related hierarchical data structures. ACM Comput. Surv., 16(2):187-260, June 1984.
-
(1984)
ACM Comput. Surv.
, vol.16
, Issue.2
, pp. 187-260
-
-
Samet, H.1
-
31
-
-
52649118020
-
Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
M. L. Yiu, C. Jensen, X. Huang, and H. Lu. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In International Conference on Data Engineering (ICDE), pages 366-375, 2008.
-
(2008)
International Conference on Data Engineering (ICDE)
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.2
Huang, X.3
Lu, H.4
|