-
1
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Myles G, Friday A, Davies N,. Preserving privacy in environments with location-based applications. IEEE Pervasive Computing 2003; 2 (1): 56-64.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
2
-
-
84945556728
-
-
Ubicomp 2001: Ubiquitous Computing, Springer, Seattle, WA, US
-
Langheinrich M,. Privacy by design-principles of privacy-aware ubiquitous systems. Ubicomp 2001: Ubiquitous Computing, Springer, Seattle, WA, US, 2001; 273-291.
-
(2001)
Privacy by Design-principles of Privacy-aware Ubiquitous Systems
, pp. 273-291
-
-
Langheinrich, M.1
-
3
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford A, Stajano F,. Location privacy in pervasive computing. IEEE Pervasive Computing 2003; 2 (1): 46-55.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
4
-
-
2342484676
-
Location-based services for mobile telephony: A study of users' privacy concerns
-
Zurich, Switzerland
-
Barkhuus L, Dey A,. Location-based services for mobile telephony: a study of users' privacy concerns. Proc. Interact, Citeseer, Zurich, Switzerland, 2003; 709-712.
-
(2003)
Proc. Interact, Citeseer
, pp. 709-712
-
-
Barkhuus, L.1
Dey, A.2
-
5
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
IEEE, Barcelona, Spain
-
Gedik B, Liu L,. Location privacy in mobile systems: a personalized anonymization model. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, IEEE, Barcelona, Spain, 2005; 620-629.
-
(2005)
Proceedings of 25th IEEE International Conference on Distributed Computing Systems
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
6
-
-
77955210576
-
Query m-invariance: Preventing query disclosures in continuous location-based services
-
Kansas City, Missouri, USA
-
Dewri R, Ray I, Ray I, Whitley D,. Query m-invariance: preventing query disclosures in continuous location-based services. 11th International Conference on Mobile Data Management, IEEE, Kansas City, Missouri, USA, 2010; 95-104.
-
(2010)
11th International Conference on Mobile Data Management, IEEE
, pp. 95-104
-
-
Dewri, R.1
Ray, I.2
Ray, I.3
Whitley, D.4
-
7
-
-
67650320950
-
A survey of computational location privacy
-
Krumm J,. A survey of computational location privacy. Personal and Ubiquitous Computing 2009; 13 (6): 391-399.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
8
-
-
2942587015
-
Mix zones: User privacy in location-aware services
-
IEEE, Lugano, Switzerland
-
Beresford A, Stajano F,. Mix zones: user privacy in location-aware services. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, IEEE, Lugano, Switzerland, 2004; 127-131.
-
(2004)
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
, pp. 127-131
-
-
Beresford, A.1
Stajano, F.2
-
9
-
-
78649342447
-
An obfuscation-based approach for protecting location privacy
-
Ardagna C, Cremonini M, De Capitani di Vimercati S, Samarati P,. An obfuscation-based approach for protecting location privacy. IEEE Transactions on Dependable and Secure Computing 2011; 8 (1): 13-27.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.1
, pp. 13-27
-
-
Ardagna, C.1
Cremonini, M.S.2
Samarati, P.3
-
10
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM, San Francisco, CA, USA
-
Gruteser M, Grunwald D,. Anonymous usage of location-based services through spatial and temporal cloaking. Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, ACM, San Francisco, CA, USA, 2003; 31-42.
-
(2003)
Proceedings of the 1st International Conference on Mobile Systems, Applications and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
11
-
-
27944454864
-
A customizable K-anonymity model for protecting location privacy
-
Columbus, Ohio, USA
-
Gedik B, Liu L,. A customizable K-anonymity model for protecting location privacy. Proceedings of the IEEE International Conference on Distributed Computing Systems, Citeseer, Columbus, Ohio, USA, 2005; 620-629.
-
(2005)
Proceedings of the IEEE International Conference on Distributed Computing Systems, Citeseer
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
12
-
-
34547720006
-
The new Casper: Query processing for location services without compromising privacy
-
VLDB Endowment, Seoul, Korea
-
Mokbel M, Chow C, Aref W,. The new Casper: query processing for location services without compromising privacy. Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB Endowment, Seoul, Korea, 2006; 763-774.
-
(2006)
Proceedings of the 32nd International Conference on Very Large Data Bases
, pp. 763-774
-
-
Mokbel, M.1
Chow, C.2
Aref, W.3
-
13
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
Gedik B, Liu L,. Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Transactions on Mobile Computing 2008; 7 (1): 1-18.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
14
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
Kalnis P, Ghinita G, Mouratidis K, Papadias D,. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 2007; 19 (12): 1719-1733.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
15
-
-
57849160922
-
Exploring historical location data for anonymity preservation in location-based services
-
Phoenix, AZ, USA
-
Xu T, Cai Y,. Exploring historical location data for anonymity preservation in location-based services. 27th Conference on Computer Communications, IEEE, Phoenix, AZ, USA, 2008; 547-555.
-
(2008)
27th Conference on Computer Communications, IEEE
, pp. 547-555
-
-
Xu, T.1
Cai, Y.2
-
16
-
-
74049157401
-
Feeling-based location privacy protection for location-based services
-
ACM, Chicago, IL, USA
-
Xu T, Cai Y,. Feeling-based location privacy protection for location-based services. Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA, 2009; 348-357.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 348-357
-
-
Xu, T.1
Cai, Y.2
-
17
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
ACM, Beijing, China
-
Xiao X, Tao Y,. M-invariance: towards privacy preserving re-publication of dynamic datasets. Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, ACM, Beijing, China, 2007; 689-700.
-
(2007)
Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
18
-
-
34248181923
-
L-Diversity: Privacy beyond K-anonymity
-
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M,. l-Diversity: privacy beyond K-anonymity. ACM Transactions on Knowledge Discovery from Data 2007; 1 (1): 1-52.
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.1
, pp. 1-52
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
19
-
-
84868112305
-
A combined clustering scheme for protecting location privacy and query privacy in pervasive environments
-
IEEE, Liverpool, UK
-
Lin C, Wu G, Yao L, Liu Z,. A combined clustering scheme for protecting location privacy and query privacy in pervasive environments. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, Liverpool, UK, 2012; 943-948.
-
(2012)
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 943-948
-
-
Lin, C.1
Wu, G.2
Yao, L.3
Liu, Z.4
-
20
-
-
80054065916
-
Fine-grained cloaking of sensitive positions in location-sharing applications
-
Damiani M, Silvestri C, Bertino E,. Fine-grained cloaking of sensitive positions in location-sharing applications. IEEE Pervasive Computing 2011; 10 (4): 64-72.
-
(2011)
IEEE Pervasive Computing
, vol.10
, Issue.4
, pp. 64-72
-
-
Damiani, M.1
Silvestri, C.2
Bertino, E.3
-
21
-
-
83755178385
-
Vtl zone-aware path cloaking algorithm
-
Washington, D.C. USA
-
Zan B, Hao P, Gruteser M, Ban X,. Vtl zone-aware path cloaking algorithm. 14th International IEEE Conference on Intelligent Transportation Systems, IEEE, Washington, D.C. USA, 2011; 1525-1530.
-
(2011)
14th International IEEE Conference on Intelligent Transportation Systems, IEEE
, pp. 1525-1530
-
-
Zan, B.1
Hao, P.2
Gruteser, M.3
Ban, X.4
-
22
-
-
79953110081
-
A clustering-based location privacy protection scheme for pervasive computing
-
Hangzhou, China
-
Yao L, Lin C, Kong X, Xia F, Wu G,. A clustering-based location privacy protection scheme for pervasive computing. Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, IEEE Computer Society, Hangzhou, China, 2010; 719-726.
-
(2010)
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, IEEE Computer Society
, pp. 719-726
-
-
Yao, L.1
Lin, C.2
Kong, X.3
Xia, F.4
Wu, G.5
-
23
-
-
84869393296
-
Location anonymity based on fake queries in continuous location-based services
-
IEEE, Prague, Czech Republic
-
Yao L, Lin C, Liu G, Deng F, Wu G,. Location anonymity based on fake queries in continuous location-based services. 2012 Seventh International Conference on Availability, Reliability and Security (ARES), IEEE, Prague, Czech Republic, 2012; 375-382.
-
(2012)
2012 Seventh International Conference on Availability, Reliability and Security (ARES)
, pp. 375-382
-
-
Yao, L.1
Lin, C.2
Liu, G.3
Deng, F.4
Wu, G.5
-
24
-
-
84855338191
-
A clustering k-anonymity scheme for location privacy preservation
-
Lin Y, Guowei W, Jia W, Feng X, Chi L, Guojun W,. A clustering k-anonymity scheme for location privacy preservation. IEICE Transactions on Information and Systems 2012; 95 (1): 134-142.
-
(2012)
IEICE Transactions on Information and Systems
, vol.95
, Issue.1
, pp. 134-142
-
-
Lin, Y.1
Guowei, W.2
Jia, W.3
Feng, X.4
Chi, L.5
Guojun, W.6
-
25
-
-
67650679361
-
P-sensitivity: A semantic privacy-protection model for location-based services
-
Beijing, China
-
Xiao Z, Xu J, Meng X,. P-sensitivity: a semantic privacy-protection model for location-based services. 9th International Conference on Mobile Data Management, IEEE, Beijing, China, 2008; 47-54.
-
(2008)
9th International Conference on Mobile Data Management, IEEE
, pp. 47-54
-
-
Xiao, Z.1
Xu, J.2
Meng, X.3
-
26
-
-
52649118020
-
Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
México
-
Yiu M, Jensen C, Huang X, Lu H,. Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. IEEE 24th International conference on Data Engineering, IEEE, Cancún, México, 2008; 366-375.
-
(2008)
IEEE 24th International Conference on Data Engineering, IEEE, Cancún
, pp. 366-375
-
-
Yiu, M.1
Jensen, C.2
Huang, X.3
Lu, H.4
-
27
-
-
0036647190
-
An efficient k-means clustering algorithm: Analysis and implementation
-
Kanungo T, Mount D, Netanyahu N, Piatko C, Silverman R, Wu A,. An efficient k-means clustering algorithm: analysis and implementation. IEEE Transactions on Pattern Analysis and Machine Intelligence 2002; 24 (7): 881-892.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.7
, pp. 881-892
-
-
Kanungo, T.1
Mount, D.2
Netanyahu, N.3
Piatko, C.4
Silverman, R.5
Wu, A.6
-
28
-
-
80051914330
-
Privacy-preserving query over encrypted graph-structured data in cloud computing
-
Minneapolis, Minnesota, USA
-
Cao N, Yang Z, Wang C, Ren K, Lou W,. Privacy-preserving query over encrypted graph-structured data in cloud computing. 31st International Conference on Distributed Computing Systems, IEEE, Minneapolis, Minnesota, USA, 2011; 393-402.
-
(2011)
31st International Conference on Distributed Computing Systems, IEEE
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
-
29
-
-
80052682046
-
Protecting location privacy using location semantics
-
San Diego, CA, USA
-
Lee B, Oh J, Yu H, Kim J,. Protecting location privacy using location semantics. Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, San Diego, CA, USA, 2011; 1289-1297.
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM
, pp. 1289-1297
-
-
Lee, B.1
Oh, J.2
Yu, H.3
Kim, J.4
-
30
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
ACM, Vancouver, BC, Canada
-
Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K,. Private queries in location based services: anonymizers are not necessary. Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, ACM, Vancouver, BC, Canada, 2008; 121-132.
-
(2008)
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.5
-
31
-
-
37849011436
-
Enabling private continuous queries for revealed user locations
-
Boston, MA, USA
-
Chow C, Mokbel M,. Enabling private continuous queries for revealed user locations. Proceedings of the 10th international conference on Advances in spatial and temporal databases, Boston, MA, USA, 2007; 258-273.
-
(2007)
Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases
, pp. 258-273
-
-
Chow, C.1
Mokbel, M.2
-
32
-
-
0025447750
-
-
. ACM: New York, NY
-
Beckmann N, Kriegel H, Schneider R, Seeger B,. The R-tree: An Efficient and Robust Access Method for Points and Rectangles, Vol. 19. ACM: New York, NY, 1990.
-
(1990)
The R-tree: An Efficient and Robust Access Method for Points and Rectangles
, vol.19
-
-
Beckmann, N.1
Kriegel, H.2
Schneider, R.3
Seeger, B.4
-
33
-
-
0002550769
-
Refining initial points for k-means clustering
-
66, San Francisco, CA, USA
-
Bradley P, Fayyad U,. Refining initial points for k-means clustering. Proceedings of the Fifteenth International Conference on Machine Learning, Vol. 66, San Francisco, CA, USA, 1998; 91-99.
-
(1998)
Proceedings of the Fifteenth International Conference on Machine Learning
, pp. 91-99
-
-
Bradley, P.1
Fayyad, U.2
-
34
-
-
33749610153
-
Privacy preserving query processing using third parties
-
Atlanta, GA, USA
-
Emekci F, Agrawal D, Abbadi A, Gulbeden A,. Privacy preserving query processing using third parties. Proceedings of the 22nd International Conference on Data Engineering, IEEE, Atlanta, GA, USA, 2006; 27-27.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering, IEEE
, pp. 27-27
-
-
Emekci, F.1
Agrawal, D.2
Abbadi, A.3
Gulbeden, A.4
-
35
-
-
52649118020
-
Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
México
-
Yiu M, Jensen C, Huang X, Lu H,. Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. IEEE 24th International Conference on Data Engineering, IEEE, Cancùn, México, 2008; 366-375.
-
(2008)
IEEE 24th International Conference on Data Engineering, IEEE, Cancùn
, pp. 366-375
-
-
Yiu, M.1
Jensen, C.2
Huang, X.3
Lu, H.4
-
36
-
-
0000301097
-
A greedy heuristic for the set-covering problem
-
Chvatal V,. A greedy heuristic for the set-covering problem. Mathematics of Operations Research 1979; 4 (3): 233-235.
-
(1979)
Mathematics of Operations Research
, vol.4
, Issue.3
, pp. 233-235
-
-
Chvatal, V.1
-
38
-
-
0023452095
-
Some np-complete problems in quadratic and nonlinear programming
-
Murty K, Kabadi S,. Some np-complete problems in quadratic and nonlinear programming. Mathematical Programming 1987; 39 (2): 117-129.
-
(1987)
Mathematical Programming
, vol.39
, Issue.2
, pp. 117-129
-
-
Murty, K.1
Kabadi, S.2
-
39
-
-
0021425650
-
New np-hard and np-complete polynomial and integer divisibility problems
-
Plaisted D,. New np-hard and np-complete polynomial and integer divisibility problems. Theoretical Computer Science 1984; 31 (1): 125-138.
-
(1984)
Theoretical Computer Science
, vol.31
, Issue.1
, pp. 125-138
-
-
Plaisted, D.1
-
40
-
-
0036647190
-
An efficient k-means clustering algorithm: Analysis and implementation
-
Kanungo T, Mount D, Netanyahu N, Piatko C, Silverman R, Wu A,. An efficient k-means clustering algorithm: analysis and implementation. IEEE Transactions on Pattern Analysis and Machine Intelligence 2002; 24 (7): 881-892.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.7
, pp. 881-892
-
-
Kanungo, T.1
Mount, D.2
Netanyahu, N.3
Piatko, C.4
Silverman, R.5
Wu, A.6
-
41
-
-
0004116989
-
-
The MIT press: Cambridge, Massachusetts, USA
-
Cormen T,. Introduction to Algorithms. The MIT press: Cambridge, Massachusetts, USA, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.1
-
42
-
-
36349027672
-
Rapid generation of realistic mobility models for vanet
-
Hong Kong, China
-
Karnadi F, Mo Z, Lan K,. Rapid generation of realistic mobility models for vanet. IEEE 2007 Wireless Communications and Networking Conference, IEEE, Hong Kong, China, 2007; 2506-2511.
-
(2007)
IEEE 2007 Wireless Communications and Networking Conference, IEEE
, pp. 2506-2511
-
-
Karnadi, F.1
Mo, Z.2
Lan, K.3
-
43
-
-
77953237786
-
-
Networking 2010, Chennai, India
-
Martinez F, Fogue M, Coll M, Cano J, Calafate C, Manzoni P,. Evaluating the impact of a novel warning message dissemination scheme for vanets using real city maps. Networking 2010, Chennai, India, 2010; 265-276.
-
(2010)
Evaluating the Impact of A Novel Warning Message Dissemination Scheme for Vanets Using Real City Maps
, pp. 265-276
-
-
Martinez, F.1
Fogue, M.2
Coll, M.3
Cano, J.4
Calafate, C.5
Manzoni, P.6
-
44
-
-
67650320950
-
A survey of computational location privacy
-
Krumm J,. A survey of computational location privacy. Personal and Ubiquitous Computing 2009; 13 (6): 391-399.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
|