메뉴 건너뛰기




Volumn , Issue , 2014, Pages 236-247

Protecting the primary users' operational privacy in spectrum sharing

Author keywords

[No Author keywords available]

Indexed keywords

TRACKING (POSITION);

EID: 84902175417     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DySPAN.2014.6817800     Document Type: Conference Paper
Times cited : (66)

References (28)
  • 4
    • 39749182452 scopus 로고    scopus 로고
    • The applicability of the perturbation based privacy preserving data mining for real-world data
    • L. Li, M. Kantarcioglu, and B. Thuraisingham, "The applicability of the perturbation based privacy preserving data mining for real-world data," Data & Knowledge Engineering, vol. 65, no. 1, pp. 5-21, 2008
    • (2008) Data & Knowledge Engineering , vol.65 , Issue.1 , pp. 5-21
    • Li, L.1    Kantarcioglu, M.2    Thuraisingham, B.3
  • 8
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010-1027, 2001
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 11
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in ACM MobiSys, 2003
    • (2003) ACM MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 14
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008
    • (2008) IEEE Trans. Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 16
    • 84883081776 scopus 로고    scopus 로고
    • Location privacy in database-driven cognitive radio networks: Attacks and countermeasures
    • Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, "Location privacy in database-driven cognitive radio networks: Attacks and countermeasures," in IEEE INFOCOM, 2013
    • (2013) IEEE INFOCOM
    • Gao, Z.1    Zhu, H.2    Liu, Y.3    Li, M.4    Cao, Z.5
  • 18
    • 0003555229 scopus 로고    scopus 로고
    • PhD thesis Department of Electrical Engineering Linköping University
    • N. Bergman, Recursive Bayesian Estimation. PhD thesis, Department of Electrical Engineering, Linköping University, 1999
    • (1999) Recursive Bayesian Estimation
    • Bergman, N.1
  • 21
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati, "Protecting respondents' identities in microdata release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010-1027, 2001
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 23
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized kanonymity: Architecture and algorithms
    • B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms," IEEE transaction on mobile computing, vol. 7, no. 1, 2008
    • (2008) IEEE Transaction on Mobile Computing , vol.7 , Issue.1
    • Gedik, B.1    Liu, L.2
  • 26
    • 84856950755 scopus 로고    scopus 로고
    • An assessment of the near-term viability of accommodating wireless broadband systems in the 1675-1710 mhz, 1755-1780 mhz, 3500-3650 mhz, 4200-4220 mhz, and 4380-4400 mhz bands
    • NTIA
    • NTIA, "An assessment of the near-term viability of accommodating wireless broadband systems in the 1675-1710 mhz, 1755-1780 mhz, 3500-3650 mhz, 4200-4220 mhz, and 4380-4400 mhz bands," in NTIA:Fast Track Report, 2010
    • (2010) NTIA:Fast Track Report
  • 28
    • 84902134265 scopus 로고    scopus 로고
    • Capacity considerations for secondary networks in tv white space
    • abs/1304.1785
    • F. Hessar and S. Roy, "Capacity considerations for secondary networks in tv white space," CoRR, vol. abs/1304.1785, 2013.
    • (2013) CoRR
    • Hessar, F.1    Roy, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.