-
2
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
M. Barbaro, T. Zeller, and S. Hansell, "A face is exposed for AOL searcher no. 4417749," New York Times, vol. 9, no. 2008, 2006.
-
(2006)
New York Times
, vol.9
, Issue.2008
-
-
Barbaro, M.1
Zeller, T.2
Hansell, S.3
-
9
-
-
77952124972
-
Privacy in inter-vehicular networks: Why simple pseudonym change is not enough
-
Los Alamitos: IEEE Computer Society Press, Februar
-
B. Wiedersheim, Z. Ma, F. Kargl, and P. Papadimitratos, "Privacy in Inter-Vehicular Networks: Why simple pseudonym change is not enough," in 2010 Seventh International Conference on Wireless Ondemand Network Systems and Services (WONS). Los Alamitos: IEEE Computer Society Press, Februar 2010, pp. 176-183.
-
(2010)
2010 Seventh International Conference on Wireless Ondemand Network Systems and Services (WONS)
, pp. 176-183
-
-
Wiedersheim, B.1
Ma, Z.2
Kargl, F.3
Papadimitratos, P.4
-
11
-
-
2942587015
-
Mix zones: User privacy in location-aware services
-
14-17 March, Orlando, FL, USA. IEEE Computer Society, 2004
-
-, "Mix Zones: User Privacy in Location-aware Services," in 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA. IEEE Computer Society, 2004, pp. 127-131.
-
(2004)
2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops)
, pp. 127-131
-
-
Beresford, A.R.1
Stajano, F.2
-
12
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
New Orleans, LA, USA, March
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in Proceedings of the 2005 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, March 2005, pp. 1187-1192.
-
(2005)
Proceedings of the 2005 IEEE Wireless Communications and Networking Conference (WCNC)
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
13
-
-
33745840780
-
Silent cascade: Enhancing location privacy without communication QoS degradation
-
ser. Lecture Notes in Computer Science, Springer
-
L. Huang, H. Yamane, K. Matsuura, and K. Sezaki, "Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation," in Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, ser. Lecture Notes in Computer Science, vol. 3934. Springer, 2006, pp. 165-180.
-
(2006)
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
, vol.3934
, pp. 165-180
-
-
Huang, L.1
Yamane, H.2
Matsuura, K.3
Sezaki, K.4
-
14
-
-
77951259549
-
SLOW: A practical pseudonym changing scheme for location privacy in VANETs
-
Tokyo, Japan, 2009. IEEE, October
-
L. Buttyán, T. Holczer, A. Weimerskirch, and W. Whyte, "SLOW: A Practical Pseudonym Changing Scheme for Location Privacy in VANETs," in Proceedings of the IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, 2009. IEEE, October 2009.
-
(2009)
Proceedings of the IEEE Vehicular Networking Conference (VNC)
-
-
Buttyán, L.1
Holczer, T.2
Weimerskirch, A.3
Whyte, W.4
-
15
-
-
84872067611
-
Simulation-based evaluation of techniques for privacy protection in VANETs
-
A. Tomandl, F. Scheuer, and H. Federrath, "Simulation-based evaluation of techniques for privacy protection in VANETs," Wireless and Mobile Computing, Networking and Communications (WiMob), 2012.
-
(2012)
Wireless and Mobile Computing, Networking and Communications (WiMob)
-
-
Tomandl, A.1
Scheuer, F.2
Federrath, H.3
-
17
-
-
70449500103
-
A new architecture for data collection in vehicular networks
-
I. Salhi, M. O. Cherif, and S.-M. Senouci, "A new architecture for data collection in vehicular networks," in Communications, 2009. ICC'09. IEEE International Conference on, 2009.
-
(2009)
Communications, 2009. ICC'09. IEEE International Conference on
-
-
Salhi, I.1
Cherif, M.O.2
Senouci, S.-M.3
-
18
-
-
84869593467
-
Data aggregation in VANETs: The VESPA approach
-
B. Defude, T. Delot, S. Ilarri, J.-L. Zechinelli, and N. Cenerario, "Data aggregation in VANETs: the VESPA approach," in Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2008.
-
(2008)
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
-
-
Defude, B.1
Delot, T.2
Ilarri, S.3
Zechinelli, J.-L.4
Cenerario, N.5
-
19
-
-
33845565342
-
Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network
-
IEEE
-
U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi, "Mobeyes: smart mobs for urban monitoring with a vehicular sensor network," Wireless Communications, IEEE, 2006.
-
(2006)
Wireless Communications
-
-
Lee, U.1
Zhou, B.2
Gerla, M.3
Magistretti, E.4
Bellavista, P.5
Corradi, A.6
-
20
-
-
61449232614
-
Dissemination and harvesting of urban data using vehicular sensing platforms
-
U. Lee, E. Magistretti, M. Gerla, P. Bellavista, and A. Corradi, "Dissemination and harvesting of urban data using vehicular sensing platforms," Vehicular Technology, IEEE Transactions on, 2009.
-
(2009)
Vehicular Technology, IEEE Transactions on
-
-
Lee, U.1
Magistretti, E.2
Gerla, M.3
Bellavista, P.4
Corradi, A.5
-
21
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," Pervasive Computing, IEEE, vol. 5, no. 4, pp. 38-46, 2006.
-
(2006)
Pervasive Computing, IEEE
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
22
-
-
44649150419
-
AnonySense: Opportunistic and privacy-preserving context collection
-
Springer
-
A. Kapadia, N. Triandopoulos, C. Cornelius, D. Peebles, and D. Kotz, "AnonySense: Opportunistic and privacy-preserving context collection," in 6th International Conference on Pervasive Computing. Springer, 2008.
-
(2008)
6th International Conference on Pervasive Computing
-
-
Kapadia, A.1
Triandopoulos, N.2
Cornelius, C.3
Peebles, D.4
Kotz, D.5
-
24
-
-
77955274113
-
Preserving privacy in participatory sensing systems
-
K. Huang, S. Kanhere, and W. Hu, "Preserving privacy in participatory sensing systems," Computer Communications, vol. 33, no. 11, pp. 1266-1280, 2010.
-
(2010)
Computer Communications
, vol.33
, Issue.11
, pp. 1266-1280
-
-
Huang, K.1
Kanhere, S.2
Hu, W.3
-
25
-
-
7544223741
-
A survey of outlier detection methodologies
-
V. Hodge and J. Austin, "A survey of outlier detection methodologies," Artificial Intelligence Review, vol. 22, no. 2, pp. 85-126, 2004.
-
(2004)
Artificial Intelligence Review
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.1
Austin, J.2
-
26
-
-
84908619431
-
VANETsim: An open source simulator for security and privacy concepts in VANETs
-
to be published at
-
A. Tomandl, D. Herrmann, K.-P. Fuchs, H. Federrath, and F. Scheuer, "VANETsim: An open source simulator for security and privacy concepts in VANETs," to be published at 9th International Workshop on Security and High Performance Computing Systems (SHPCS 2014), 2014.
-
(2014)
9th International Workshop on Security and High Performance Computing Systems (SHPCS 2014)
-
-
Tomandl, A.1
Herrmann, D.2
Fuchs, K.-P.3
Federrath, H.4
Scheuer, F.5
-
28
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, "How to win the clonewars: efficient periodic n-times anonymous authentication," in Proceedings of the 13th ACM conference on Computer and Communications Security, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
29
-
-
0001604533
-
Blind signatures for untraceable payments
-
Springer
-
D. Chaum, "Blind signatures for untraceable payments," in Advances in cryptology. Springer, 1983.
-
(1983)
Advances in Cryptology
-
-
Chaum, D.1
-
30
-
-
0003062028
-
Blind signature system
-
Springer
-
-, "Blind signature system," in Advances in cryptology. Springer, 1984, pp. 153-153.
-
(1984)
Advances in Cryptology
, pp. 153-153
-
-
Chaum, D.1
-
31
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
-, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
32
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
IEEE
-
R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.
-
(2008)
INFOCOM 2008. The 27th Conference on Computer Communications
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
33
-
-
58149123333
-
TSVC: Timed efficient and secure vehicular communications with privacy preserving
-
X. Lin, X. Sun, X. Wang, C. Zhang, P. Ho, and X. Shen, "TSVC: timed efficient and secure vehicular communications with privacy preserving," Wireless Communications, IEEE Transactions on, 2008.
-
(2008)
Wireless Communications, IEEE Transactions on
-
-
Lin, X.1
Sun, X.2
Wang, X.3
Zhang, C.4
Ho, P.5
Shen, X.6
-
34
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, J. Tygar, and D. Song, "The TESLA broadcast authentication protocol," CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002.
-
(2002)
CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
36
-
-
70449565205
-
TACKing together efficient authentication, revocation, and privacy in VANETs
-
A. Studer, E. Shi, F. Bai, and A. Perrig, "TACKing together efficient authentication, revocation, and privacy in VANETs," in Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON'09. 6th Annual IEEE Communications Society Conference on. IEEE, 2009, pp. 1-9.
-
(2009)
Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON'09. 6th Annual IEEE Communications Society Conference On. IEEE
, pp. 1-9
-
-
Studer, A.1
Shi, E.2
Bai, F.3
Perrig, A.4
-
37
-
-
33746048789
-
Unclonable group identification
-
Springer
-
I. Damgård, K. Dupont, and M. Østergaard Pedersen, "Unclonable group identification," in Advances in Cryptology-EUROCRYPT 2006. Springer, 2006, pp. 555-572.
-
(2006)
Advances in Cryptology-EUROCRYPT 2006
, pp. 555-572
-
-
Damgård, I.1
Dupont, K.2
Østergaard Pedersen, M.3
-
38
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
Montréal, Québec, Canada, September 10, 2007, W. Holfelder, P. Santi, Y.-C. Hu, and J.-P. Hubaux, Eds. ACM
-
G. Calandriello, P. Papadimitratos, J. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET," in Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, VANET 2007, Montréal, Québec, Canada, September 10, 2007, W. Holfelder, P. Santi, Y.-C. Hu, and J.-P. Hubaux, Eds. ACM, 2007, pp. 19-28.
-
(2007)
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, VANET 2007
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.3
Lioy, A.4
-
39
-
-
0011584005
-
Uniqueness of simple demographics in the U.S. Population
-
Pittsburgh, PA, Tech. Rep. LIDAP-WP4
-
L. Sweeney, "Uniqueness of Simple Demographics in the U.S. Population," Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA, Tech. Rep. LIDAP-WP4, 2000.
-
(2000)
Carnegie Mellon University, Laboratory for International Data Privacy
-
-
Sweeney, L.1
-
40
-
-
80051982003
-
A unified framework for location privacy
-
R. Shokri, J. Freudiger, and J. Hubaux, "A unified framework for location privacy," 3rd Hot Topics in Privacy Enhancing Technologies (HotPETs), pp. 203-214, 2010.
-
(2010)
3rd Hot Topics in Privacy Enhancing Technologies (HotPETs)
, pp. 203-214
-
-
Shokri, R.1
Freudiger, J.2
Hubaux, J.3
-
41
-
-
78650879093
-
Show me how you move and I will tell you who you are
-
ACM
-
S. Gambs, M. Killijian, and M. del Prado Cortez, "Show me how you move and I will tell you who you are," in Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. ACM, 2010, pp. 34-41.
-
(2010)
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
, pp. 34-41
-
-
Gambs, S.1
Killijian, M.2
Del Prado-Cortez, M.3
|