메뉴 건너뛰기




Volumn 2016-January, Issue , 2016, Pages 279-286

Decentralized enforcement of k-anonymity for location privacy using secret sharing

Author keywords

Conferences; Cryptography; Data privacy; Databases; Privacy; Servers; Vehicles

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DATABASE SYSTEMS; LOCATION; SERVERS; VEHICLES;

EID: 84962030789     PISSN: 21579857     EISSN: 21579865     Source Type: Conference Proceeding    
DOI: 10.1109/VNC.2015.7385589     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 1
    • 0005324550 scopus 로고    scopus 로고
    • Estimation of origin-destination matrices using traffic counts - A literature survey
    • Tech. Rep. May
    • T. Abrahamsson, "Estimation of origin-destination matrices using traffic counts - a literature survey", International Institute for Applied Systems Analysis, Tech. Rep. IR-98-021, May 1998.
    • (1998) International Institute for Applied Systems Analysis
    • Abrahamsson, T.1
  • 3
    • 34047228428 scopus 로고    scopus 로고
    • Deriving origin destination data from a mobile phone network
    • Mar.
    • N. Caceres, J. Wideberg, and F. Benitez, "Deriving origin destination data from a mobile phone network", Intelligent Transport Systems, IET, vol. 1, no. 1, pp. 15-26, Mar. 2007.
    • (2007) Intelligent Transport Systems, IET , vol.1 , Issue.1 , pp. 15-26
    • Caceres, N.1    Wideberg, J.2    Benitez, F.3
  • 6
    • 84887323038 scopus 로고    scopus 로고
    • Floating car data from smartphones: What google and waze know about you and how hackers can control traffic
    • T. Jeske, "Floating car data from smartphones: What google and waze know about you and how hackers can control traffic", Proceedings of the Black Hat Europe, 2013.
    • (2013) Proceedings of the Black Hat Europe
    • Jeske, T.1
  • 7
    • 33750879264 scopus 로고    scopus 로고
    • Enhancing security and privacy in traffic-monitoring systems
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems", Pervasive Computing, IEEE, vol. 5, no. 4, pp. 38-46, 2006.
    • (2006) Pervasive Computing, IEEE , vol.5 , Issue.4 , pp. 38-46
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 8
    • 38049035427 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • Springer
    • J. Krumm, "Inference attacks on location tracks", in Pervasive Computing, Springer, 2007, pp. 127-143.
    • (2007) Pervasive Computing , pp. 127-143
    • Krumm, J.1
  • 9
    • 67650312114 scopus 로고    scopus 로고
    • On the anonymity of home/work location pairs
    • Springer
    • P. Golle and K. Partridge, "On the anonymity of home/work location pairs", in Pervasive Computing, Springer, 2009, pp. 390-397.
    • (2009) Pervasive Computing , pp. 390-397
    • Golle, P.1    Partridge, K.2
  • 13
    • 84962004357 scopus 로고    scopus 로고
    • Sep. [Online]. (visited on 09/03/2015)
    • The Guardian, "Surveillance", Sep. 2015. [Online]. Available: http://www.theguardian.com/world/surveillance (visited on 09/03/2015).
    • (2015) Surveillance
  • 16
    • 45749099297 scopus 로고    scopus 로고
    • A tutorial survey on vehicular ad hoc networks
    • H. Hartenstein and K. P. Laberteaux, "A tutorial survey on vehicular ad hoc networks", IEEE Communications Magazine, vol. 46, no. 6, pp. 164-171, 2008.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.6 , pp. 164-171
    • Hartenstein, H.1    Laberteaux, K.P.2
  • 18
    • 84947712163 scopus 로고    scopus 로고
    • Federal motor vehicle safety standards: Vehicle-to-vehicle (V2V) communications; advance notice of proposed rulemaking (ANPRM); docket no. NHTSA-2014-0022
    • Aug.
    • U.S. Departement of Transportation - National Highway Traffic Safety Administration, "Federal motor vehicle safety standards: Vehicle-to-vehicle (V2V) communications; advance notice of proposed rulemaking (ANPRM); Docket No. NHTSA-2014-0022", Federal Register, vol. 79, no. 161, Aug. 2014.
    • (2014) Federal Register , vol.79 , Issue.161
  • 19
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano, "Location privacy in pervasive computing", IEEE Pervasive computing, vol. 2, no. 1, pp. 46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 20
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Springer
    • M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy", in Pervasive computing, Springer, 2005, pp. 152-170.
    • (2005) Pervasive Computing , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 21
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • J. Krumm, "A survey of computational location privacy", Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, 2009.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret", Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.