-
1
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
USENIX
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of MobiSys, USENIX (2003)
-
(2003)
Proc. of MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
2
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
ACM
-
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proc. of VLDB, pp. 763-774. ACM (2006)
-
(2006)
Proc. of VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
3
-
-
33947121654
-
Protection of location privacy using dummies for location-based services
-
Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proc. of ICDE Workshops, p. 1248 (2005)
-
(2005)
Proc. of ICDE Workshops
, pp. 1248
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
4
-
-
70450207983
-
Privately querying location-based services with Sybil- Query
-
ACM
-
Shankar, P., Ganapathy, V., Iftode, L.: Privately querying location-based services with Sybil- Query. In: Proc. of UbiComp, pp. 31-40. ACM (2009)
-
(2009)
Proc. of UbiComp
, pp. 31-40
-
-
Shankar, P.1
Ganapathy, V.2
Iftode, L.3
-
5
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with privacygrid
-
ACM
-
Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proc. of WWW, pp. 237-246. ACM (2008)
-
(2008)
Proc. of WWW
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
6
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Pervasive Computing: Third International Conference, PERVASIVE 2005, Proceedings
-
Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152-170. Springer, Heidelberg (2005) (Pubitemid 41313330)
-
(2005)
Lecture Notes in Computer Science
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
7
-
-
68149139701
-
Location diversity: Enhanced privacy protection in location based services
-
Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. Springer, Heidelberg
-
Xue, M., Kalnis, P., Pung, H.K.: Location diversity: Enhanced privacy protection in location based services. In: Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. LNCS, vol. 5561, pp. 70-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5561
, pp. 70-87
-
-
Xue, M.1
Kalnis, P.2
Pung, H.K.3
-
8
-
-
84869465300
-
Protecting location privacy: Optimal strategy against localization attacks
-
ACM
-
Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Boudec, J.Y.L.: Protecting location privacy: optimal strategy against localization attacks. In: Proc. of CCS, pp. 617-627. ACM (2012)
-
(2012)
Proc. of CCS
, pp. 617-627
-
-
Shokri, R.1
Theodorakopoulos, G.2
Troncoso, C.3
Hubaux, J.P.4
Boudec, J.Y.L.5
-
9
-
-
80051968910
-
Quantifying location privacy
-
IEEE
-
Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proc. of S&P, pp. 247-262. IEEE (2011)
-
(2011)
Proc. of S&P
, pp. 247-262
-
-
Shokri, R.1
Theodorakopoulos, G.2
Boudec, J.Y.L.3
Hubaux, J.P.4
-
10
-
-
33746335051
-
Differential privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
11
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
IEEE
-
Machanavajjhala, A., Kifer, D., Abowd, J.M., Gehrke, J., Vilhuber, L.: Privacy: Theory meets practice on the map. In: Proc. of ICDE, pp. 277-286. IEEE (2008)
-
(2008)
Proc. of ICDE
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
12
-
-
84555217817
-
Differential privacy for location pattern mining
-
ACM
-
Ho, S.S., Ruan, S.: Differential privacy for location pattern mining. In: Proc. of SPRINGL, pp. 17-24. ACM (2011)
-
(2011)
Proc. of SPRINGL
, pp. 17-24
-
-
Ho, S.S.1
Ruan, S.2
-
13
-
-
84869393316
-
Differentially private sequential data publication via variable-length n-grams
-
ACM
-
Chen, R., Ács, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: Proc. of CCS, pp. 638-649. ACM (2012)
-
(2012)
Proc. of CCS
, pp. 638-649
-
-
Chen, R.1
Ács, G.2
Castelluccia, C.3
-
14
-
-
84889037772
-
Geoindistinguishability: Differential privacy for location-based systems
-
ACM
-
Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geoindistinguishability: differential privacy for location-based systems. In: Proc. of CCS, pp. 901-914. ACM (2013)
-
(2013)
Proc. of CCS
, pp. 901-914
-
-
Andrés, M.E.1
Bordenabe, N.E.2
Chatzikokolakis, K.3
Palamidessi, C.4
-
15
-
-
78449245352
-
Geolife: A collaborative social networking service among user, location and trajectory
-
Zheng, Y., Xie, X., Ma,W.Y.: Geolife: A collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33(2), 32-39 (2010)
-
(2010)
IEEE Data Eng. Bull.
, vol.33
, Issue.2
, pp. 32-39
-
-
Zheng, Y.1
Xie, X.2
Ma, W.Y.3
-
16
-
-
78650629618
-
T-drive: Driving directions based on taxi trajectories
-
Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., Huang, Y.: T-drive: driving directions based on taxi trajectories. In: GIS, pp. 99-108 (2010)
-
(2010)
GIS
, pp. 99-108
-
-
Yuan, J.1
Zheng, Y.2
Zhang, C.3
Xie, W.4
Xie, X.5
Sun, G.6
Huang, Y.7
-
17
-
-
84944700131
-
A predictive differentially-private mechanism for mobility traces
-
abs/1311.4008
-
Chatzikokolakis, K., Palamidessi, C., Stronati, M.: A predictive differentially-private mechanism for mobility traces. CoRR abs/1311.4008 (2013)
-
(2013)
CoRR
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Stronati, M.3
-
18
-
-
78249264133
-
Distance makes the types grow stronger: A calculus for differential privacy
-
ACM
-
Reed, J., Pierce, B.C.: Distance makes the types grow stronger: a calculus for differential privacy. In: Proc. of ICFP, pp. 157-168. ACM (2010)
-
(2010)
Proc. of ICFP
, pp. 157-168
-
-
Reed, J.1
Pierce, B.C.2
-
19
-
-
84884918157
-
Broadening the Scope of Differential Privacy using metrics
-
De Cristofaro, E., Wright, M. (eds.) PETS 2013. Springer, Heidelberg
-
Chatzikokolakis, K., Andrés, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the Scope of Differential Privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 82-102. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7981
, pp. 82-102
-
-
Chatzikokolakis, K.1
Andrés, M.E.2
Bordenabe, N.E.3
Palamidessi, C.4
-
20
-
-
77954745685
-
Interactive privacy via the median mechanism
-
Roth, A., Roughgarden, T.: Interactive privacy via the median mechanism. In: Proc. of STOC, pp. 765-774 (2010)
-
(2010)
Proc. of STOC
, pp. 765-774
-
-
Roth, A.1
Roughgarden, T.2
-
21
-
-
80051522333
-
Show me how you move and i will tell you who you are
-
Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Show me how you move and i will tell you who you are. Trans. on Data Privacy 4(2), 103-126 (2011)
-
(2011)
Trans. on Data Privacy
, vol.4
, Issue.2
, pp. 103-126
-
-
Gambs, S.1
Killijian, M.O.2
Del Prado Cortez, M.N.3
-
22
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
IEEE
-
Hardt,M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: FOCS, pp. 61-70. IEEE (2010)
-
(2010)
FOCS
, pp. 61-70
-
-
Hardt, M.1
Rothblum, G.N.2
-
23
-
-
77954717626
-
Differential privacy under continual observation
-
ACM
-
Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: STOC, pp. 715-724. ACM (2010)
-
(2010)
STOC
, pp. 715-724
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
-
24
-
-
84860554044
-
Privacy preservation in the dissemination of location data
-
Terrovitis, M.: Privacy preservation in the dissemination of location data. SIGKDD Explorations 13(1), 6-18 (2011)
-
(2011)
SIGKDD Explorations
, vol.13
, Issue.1
, pp. 6-18
-
-
Terrovitis, M.1
-
25
-
-
67650320950
-
A survey of computational location privacy
-
Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391-399 (2009)
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
26
-
-
84863294412
-
Privacy protection for users of location-based services
-
Shin, K.G., Ju, X., Chen, Z., Hu, X.: Privacy protection for users of location-based services. IEEE Wireless Commun. 19(2), 30-39 (2012)
-
(2012)
IEEE Wireless Commun.
, vol.19
, Issue.2
, pp. 30-39
-
-
Shin, K.G.1
Ju, X.2
Chen, Z.3
Hu, X.4
-
27
-
-
33847315663
-
Protecting location privacy through path confusion
-
IEEE
-
Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Proc. of SecureComm, pp. 194-205. IEEE (2005)
-
(2005)
Proc. of SecureComm
, pp. 194-205
-
-
Hoh, B.1
Gruteser, M.2
-
28
-
-
84889022653
-
Local differential perturbations: Location privacy under approximate knowledge attackers
-
PrePrints
-
Dewri, R.: Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Trans. on Mobile Computing 99((PrePrints), 1 (2012)
-
(2012)
IEEE Trans. on Mobile Computing
, vol.99
, pp. 1
-
-
Dewri, R.1
-
29
-
-
66549090154
-
Preserving user location privacy in mobile data management infrastructures
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393-412. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4258
, pp. 393-412
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
30
-
-
37849032496
-
Location privacy protection through obfuscation-based techniques
-
Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. Springer, Heidelberg
-
Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47-60. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 47-60
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Capitani Di Vimercati, S.4
Samarati, P.5
|