메뉴 건너뛰기




Volumn , Issue , 2012, Pages 183-196

Koi: A location-privacy platform for smartphone apps

Author keywords

[No Author keywords available]

Indexed keywords

LOCATION; ONLINE SYSTEMS; SYSTEMS ANALYSIS; TELECOMMUNICATION SERVICES; TELEPHONE SETS;

EID: 85076642950     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (54)

References (43)
  • 4
    • 0031245667 scopus 로고    scopus 로고
    • Context-aware applications: From the laboratory to the markeyplace
    • October
    • P. Brown, J. Bovey, and X. Chen. Context-Aware Applications: From the Laboratory to the Markeyplace. IEEE Personal Communications, October 1997.
    • (1997) IEEE Personal Communications
    • Brown, P.1    Bovey, J.2    Chen, X.3
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2), 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2
    • Chaum, D.L.1
  • 8
    • 74049088801 scopus 로고    scopus 로고
    • AnonySense: Privacy-aware people-centric sensing
    • C. Cornelius et al. AnonySense: Privacy-Aware People-Centric Sensing. In ACM MobiSys, 2008.
    • (2008) ACM MobiSys
    • Cornelius, C.1
  • 11
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. Yao. On the security of public key protocols. Information Theory, IEEE Transactions on, 29(2):198-208, March 1983.
    • (1983) Information Theory, IEEE Transactions on , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 12
    • 85076637930 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • C. Dong, G. Russello, and N. Dulay. Shared and Searchable Encrypted Data for Untrusted Servers. In DBSec, 2008.
    • (2008) DBSec
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 13
    • 50249086141 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential Privacy. In ICALP, 2006.
    • (2006) ICALP
    • Dwork, C.1
  • 14
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6    Sheth, A.N.7
  • 15
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. In EUROCRYPT, 2004.
    • (2004) EUROCRYPT
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 17
    • 33745888870 scopus 로고    scopus 로고
    • Survey on location privacy in pervasive computing
    • W. W. Gorlach, A. Terpstra, and A. Heinemann. Survey on Location Privacy in Pervasive Computing. In SPPC, 2004.
    • (2004) SPPC
    • Gorlach, W.W.1    Terpstra, A.2    Heinemann, A.3
  • 18
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. In ACM CCS, 2006.
    • (2006) ACM CCS
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 19
    • 1642286258 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. In Proceedings ofMo-biSys'03.
    • Proceedings ofMo-biSys'03
    • Gruteser, M.1    Grunwald, D.2
  • 20
    • 84904894793 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. In MobiSys, 2008.
    • (2008) MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 21
    • 85076642477 scopus 로고    scopus 로고
    • The location stack: A layered model for location in ubiquitous computing
    • J. Hightower, B. Brumitt, and G. Borriello. The Location Stack: A Layered Model for Location in Ubiquitous Computing. In IEEE WMCSA, 2002.
    • (2002) IEEE WMCSA
    • Hightower, J.1    Brumitt, B.2    Borriello, G.3
  • 25
    • 78651432298 scopus 로고    scopus 로고
    • Providing confidentiality in content-based publish/subscribe systems
    • M. Ion, G. Russello, and B. Crispo. Providing Confidentiality in Content-based Publish/Subscribe Systems. In SECRYPT, 2010.
    • (2010) SECRYPT
    • Ion, M.1    Russello, G.2    Crispo, B.3
  • 26
    • 78149307650 scopus 로고    scopus 로고
    • Trust no one: A decentralized matching service for privacy in location based services
    • S. Jaiswal and A. Nandi. Trust No One: A Decentralized Matching Service for Privacy in Location Based Services. In MobiHeld, 2010.
    • (2010) MobiHeld
    • Jaiswal, S.1    Nandi, A.2
  • 27
    • 33644536683 scopus 로고    scopus 로고
    • Scalable security and accounting services for content-basedPublish/subscribe systems
    • H. Khurana. Scalable Security and Accounting Services for Content-basedPublish/Subscribe Systems. In ACMSymposiumon AppliedCom-puting, 2005.
    • (2005) ACM Symposiumon AppliedCom-puting
    • Khurana, H.1
  • 28
    • 85077890829 scopus 로고    scopus 로고
    • Multi-sensor location tracking
    • U. Leonhardt and J. Magee. Multi-sensor location tracking. In Mobicom, 1998.
    • (1998) Mobicom
    • Leonhardt, U.1    Magee, J.2
  • 30
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • January
    • G. Myles, A. Friday, and N. Davies. Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing, 2(1), January 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 32
    • 84919085619 scopus 로고
    • An improved algorithm for computing loga-rithms over gf(p) and its cryptographic significance
    • January
    • S. Pohlig and M. Hellman. An Improved Algorithm for Computing Loga-rithms over gf(p) and its Cryptographic Significance. IEEE Transactions on Information Theory, 24(1):106-110, January 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 33
    • 85076636050 scopus 로고    scopus 로고
    • Proverif. http://www.proverif.ens.fr/.
    • Proverif
  • 34
    • 78049392713 scopus 로고    scopus 로고
    • Enabling confidentiality in content-based publish/subscribe infrastructures
    • C. Raiciu and D. S. Rosenblum. Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures. In IEEE SecureComm, 2006.
    • (2006) IEEE SecureComm
    • Raiciu, C.1    Rosenblum, D.S.2
  • 36
    • 84901315261 scopus 로고    scopus 로고
    • I'm here! privacy challenges in mobile location sharing
    • May
    • M. Scipioni and M. Langheinrich. I'm Here! Privacy Challenges in Mobile Location Sharing. In IWSSI/SPMU, May 2010.
    • (2010) IWSSI/SPMU
    • Scipioni, M.1    Langheinrich, M.2
  • 37
    • 85015045823 scopus 로고    scopus 로고
    • Privacy-preserving content-based publish/subscribe networks
    • A. Shikfa, M. Onen, and R. Molva. Privacy-Preserving Content-Based Publish/Subscribe Networks. In IFIP SEC, 2009.
    • (2009) IFIP SEC
    • Shikfa, A.1    Onen, M.2    Molva, R.3
  • 38
    • 85132912013 scopus 로고
    • Providing location information in a ubiq-uitous computing environment
    • M. Spreitzer and M. Theimer. Providing Location Information in a Ubiq-uitous Computing Environment. In SOSP, 1993.
    • (1993) SOSP
    • Spreitzer, M.1    Theimer, M.2
  • 39
    • 34848864560 scopus 로고    scopus 로고
    • Secure event dissemination in publish-subscribe networks
    • M. Srivatsa and L. Liu. Secure Event Dissemination in Publish-Subscribe Networks. In ICDCS, 2007.
    • (2007) ICDCS
    • Srivatsa, M.1    Liu, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.