-
1
-
-
0005324550
-
Estimation of origin-destination matrices using traffic counts - A literature survey
-
Tech. Rep. May
-
T. Abrahamsson, "Estimation of origin-destination matrices using traffic counts - a literature survey", International Institute for Applied Systems Analysis, Tech. Rep. IR-98-021, May 1998.
-
(1998)
International Institute for Applied Systems Analysis
-
-
Abrahamsson, T.1
-
3
-
-
34047228428
-
Deriving origin destination data from a mobile phone network
-
Mar.
-
N. Caceres, J. Wideberg, and F. Benitez, "Deriving origin destination data from a mobile phone network", Intelligent Transport Systems, IET, vol. 1, no. 1, pp. 15-26, Mar. 2007.
-
(2007)
Intelligent Transport Systems, IET
, vol.1
, Issue.1
, pp. 15-26
-
-
Caceres, N.1
Wideberg, J.2
Benitez, F.3
-
5
-
-
1942473008
-
Application of probe-vehicle data for real-time traffic-state estimation and short-term travel-time prediction on a freeway
-
C. Nanthawichit, T. Nakatsuji, and H. Suzuki, "Application of probe-vehicle data for real-time traffic-state estimation and short-term travel-time prediction on a freeway", Transportation Research Record: Journal of the Transportation Research Board, no. 1855, pp. 49-59, 2003.
-
(2003)
Transportation Research Record: Journal of the Transportation Research Board
, vol.1855
, pp. 49-59
-
-
Nanthawichit, C.1
Nakatsuji, T.2
Suzuki, H.3
-
6
-
-
84887323038
-
Floating car data from smartphones: What google and waze know about you and how hackers can control traffic
-
T. Jeske, "Floating car data from smartphones: What google and waze know about you and how hackers can control traffic", Proceedings of the Black Hat Europe, 2013.
-
(2013)
Proceedings of the Black Hat Europe
-
-
Jeske, T.1
-
7
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems", Pervasive Computing, IEEE, vol. 5, no. 4, pp. 38-46, 2006.
-
(2006)
Pervasive Computing, IEEE
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
8
-
-
38049035427
-
Inference attacks on location tracks
-
Springer
-
J. Krumm, "Inference attacks on location tracks", in Pervasive Computing, Springer, 2007, pp. 127-143.
-
(2007)
Pervasive Computing
, pp. 127-143
-
-
Krumm, J.1
-
9
-
-
67650312114
-
On the anonymity of home/work location pairs
-
Springer
-
P. Golle and K. Partridge, "On the anonymity of home/work location pairs", in Pervasive Computing, Springer, 2009, pp. 390-397.
-
(2009)
Pervasive Computing
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
10
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking", in Proceedings of the 1st international conference on Mobile systems, applications and services, ACM, 2003, pp. 31-42.
-
(2003)
Proceedings of the 1st International Conference on Mobile Systems, Applications and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
11
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "K-anonymity: A model for protecting privacy", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
13
-
-
84962004357
-
-
Sep. [Online]. (visited on 09/03/2015)
-
The Guardian, "Surveillance", Sep. 2015. [Online]. Available: http://www.theguardian.com/world/surveillance (visited on 09/03/2015).
-
(2015)
Surveillance
-
-
-
16
-
-
45749099297
-
A tutorial survey on vehicular ad hoc networks
-
H. Hartenstein and K. P. Laberteaux, "A tutorial survey on vehicular ad hoc networks", IEEE Communications Magazine, vol. 46, no. 6, pp. 164-171, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.6
, pp. 164-171
-
-
Hartenstein, H.1
Laberteaux, K.P.2
-
18
-
-
84947712163
-
Federal motor vehicle safety standards: Vehicle-to-vehicle (V2V) communications; advance notice of proposed rulemaking (ANPRM); docket no. NHTSA-2014-0022
-
Aug.
-
U.S. Departement of Transportation - National Highway Traffic Safety Administration, "Federal motor vehicle safety standards: Vehicle-to-vehicle (V2V) communications; advance notice of proposed rulemaking (ANPRM); Docket No. NHTSA-2014-0022", Federal Register, vol. 79, no. 161, Aug. 2014.
-
(2014)
Federal Register
, vol.79
, Issue.161
-
-
-
19
-
-
2942524994
-
Location privacy in pervasive computing
-
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing", IEEE Pervasive computing, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
20
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Springer
-
M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy", in Pervasive computing, Springer, 2005, pp. 152-170.
-
(2005)
Pervasive Computing
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
21
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm, "A survey of computational location privacy", Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
22
-
-
33847315663
-
Protecting location privacy through path confusion
-
IEEE
-
B. Hoh and M. Gruteser, "Protecting location privacy through path confusion", in Security and Privacy for Emerging Areas in Communications Networks, 2005. Secure Comm 2005. First International Conference on, IEEE, 2005, pp. 194-205.
-
(2005)
Security and Privacy for Emerging Areas in Communications Networks, 2005. Secure Comm 2005. First International Conference on
, pp. 194-205
-
-
Hoh, B.1
Gruteser, M.2
-
23
-
-
84917690750
-
Padavan: Privacy-aware data accumulation for vehicular ad-hoc networks
-
IEEE
-
A. Tomandl, D. Herrmann, and H. Federrath, "Padavan: Privacy-aware data accumulation for vehicular ad-hoc networks", in Wireless and Mobile Computing, Networking and Communications (WiMob), 2014 IEEE 10th International Conference on, IEEE, 2014, pp. 487-493.
-
(2014)
Wireless and Mobile Computing, Networking and Communications (WiMob), 2014 IEEE 10th International Conference on
, pp. 487-493
-
-
Tomandl, A.1
Herrmann, D.2
Federrath, H.3
-
24
-
-
59249093820
-
How to protect privacy in floating car data systems
-
ACM
-
S. Rass, S. Fuchs, M. Schaffer, and K. Kyamakya, "How to protect privacy in floating car data systems", in Proceedings of the fifth ACM international workshop on Vehicul Ar Inter-NETworking, ACM, 2008, pp. 17-22.
-
(2008)
Proceedings of the Fifth ACM International Workshop on Vehicul Ar Inter-NETworking
, pp. 17-22
-
-
Rass, S.1
Fuchs, S.2
Schaffer, M.3
Kyamakya, K.4
-
25
-
-
85127507791
-
Virtual trip lines for distributed privacypreserving traffic monitoring
-
ACM
-
B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson, "Virtual trip lines for distributed privacypreserving traffic monitoring", in Proceedings of the 6th international conference on Mobile systems, applications, and services, ACM, 2008, pp. 15-28.
-
(2008)
Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 15-28
-
-
Hoh, B.1
Gruteser, M.2
Herring, R.3
Ban, J.4
Work, D.5
Herrera, J.-C.6
Bayen, A.M.7
Annavaram, M.8
Jacobson, Q.9
-
26
-
-
84961993124
-
Social key exchange network - From ad-hoc key exchanges to a dense key network
-
Oct.
-
D. Achenbach, D. Förster, C. Henrich, D. Kraschewski, and J. Müller-Quade, "Social key exchange network - from ad-hoc key exchanges to a dense key network", in Tagungsband der INFORMATIK 2011, Lecture Notes in Informatics, vol. P192, Oct. 2011.
-
(2011)
Tagungsband der INFORMATIK 2011, Lecture Notes in Informatics
, vol.P192
-
-
Achenbach, D.1
Förster, D.2
Henrich, C.3
Kraschewski, D.4
Müller-Quade, J.5
-
27
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: Design and architecture", Communications Magazine, IEEE, vol. 46, no. 11, pp. 100-109, 2008.
-
(2008)
Communications Magazine, IEEE
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.-P.10
-
28
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret", Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|