메뉴 건너뛰기




Volumn 2021-January, Issue , 2015, Pages 817-823

Where's Wally? Precise User Discovery Attacks in Location Proximity Services

Author keywords

location privacy; location proximity; location based services; spatial cloaking; user discovery attacks

Indexed keywords

DATA PRIVACY; LOCATION BASED SERVICES; SOCIAL NETWORKING (ONLINE); SURVEYING; TELECOMMUNICATION SERVICES;

EID: 85082947529     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813605     Document Type: Conference Paper
Times cited : (61)

References (46)
  • 12
    • 85040308047 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In ACM WWW 2009.
    • (2009) Acm Www
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 14
    • 84881225762 scopus 로고    scopus 로고
    • You are what you like! information leakage through users' interests
    • A. Chaabane, G. Acs, and M. Kaafar. You are what you like! information leakage through users' interests. In NDSS '12.
    • Ndss '12
    • Chaabane, A.1    Acs, G.2    Kaafar, M.3
  • 16
    • 84882952038 scopus 로고    scopus 로고
    • Approximation algorithms for the discrete piercing set problem for unit disks
    • M. De, G. K. Das, and S. C. Nandy. Approximation algorithms for the discrete piercing set problem for unit disks. In CCCG, 2011.
    • (2011) Cccg
    • De, M.1    Das, G.K.2    Nandy, S.C.3
  • 17
    • 85133722862 scopus 로고    scopus 로고
    • Location privacy protection for smartphone users
    • K. Fawaz and K. G. Shin. Location privacy protection for smartphone users. CCS '14'.
    • Ccs '14'
    • Fawaz, K.1    Shin, K.G.2
  • 18
    • 85133712846 scopus 로고    scopus 로고
    • Preventing velocity-based linkage attacks in location-aware applications
    • G. Ghinita, M. L. Damiani, C. Silvestri, and E. Bertino. Preventing velocity-based linkage attacks in location-aware applications. In GIS '09'.
    • Gis '09'
    • Ghinita, G.1    Damiani, M.L.2    Silvestri, C.3    Bertino, E.4
  • 19
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.
    • (2003) MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 20
    • 84881219827 scopus 로고    scopus 로고
    • Countering overlapping rectangle privacy attack for moving knn queries
    • T. Hashem, L. Kulik, and R. Zhang. Countering overlapping rectangle privacy attack for moving knn queries. Inf. Syst., 38(3).
    • Inf. Syst , vol.38 , Issue.3
    • Hashem, T.1    Kulik, L.2    Zhang, R.3
  • 22
    • 84906538823 scopus 로고    scopus 로고
    • Trilateration-based localization algorithm using the lemoine point formulation
    • M.-S. Huang and R. M. Narayanan. Trilateration-based localization algorithm using the lemoine point formulation. IETE Journal of Research, 60(1):60-73, 2014.
    • (2014) Iete Journal of Research , vol.60 , Issue.1 , pp. 60-73
    • Huang, M.-S.1    Narayanan, R.M.2
  • 23
    • 84954537920 scopus 로고    scopus 로고
    • I know where you've been: Geo-inference attacks via the browser cache
    • Y. Jia, X. Dong, Z. Liang, and P. Saxena. I know where you've been: Geo-inference attacks via the browser cache. In W2SP 2014.
    • (2014) W2SP
    • Jia, Y.1    Dong, X.2    Liang, Z.3    Saxena, P.4
  • 24
    • 84943646932 scopus 로고    scopus 로고
    • All your location are belong to us: Breaking mobile social networks for automated user location tracking
    • August
    • M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, and K. Ren. All your location are belong to us: Breaking mobile social networks for automated user location tracking. In MobiHoc, August 2014.
    • (2014) MobiHoc
    • Li, M.1    Zhu, H.2    Gao, Z.3    Chen, S.4    Yu, L.5    Hu, S.6    Ren, K.7
  • 28
    • 0000169232 scopus 로고
    • An algorithm for least-squares estimation of nonlinear parameters
    • D. W. Marquardt. An algorithm for least-squares estimation of nonlinear parameters. SIAM Journal of Applied Mathematics, 11(2):431-441, 1963.
    • (1963) Siam Journal of Applied Mathematics , vol.11 , Issue.2 , pp. 431-441
    • Marquardt, D.W.1
  • 29
    • 84883508137 scopus 로고    scopus 로고
    • A practical location privacy attack in proximity services
    • S. Mascetti, L. Bertolaja, and C. Bettini. A practical location privacy attack in proximity services. In MDM, 2013.
    • (2013) Mdm
    • Mascetti, S.1    Bertolaja, L.2    Bettini, C.3
  • 31
    • 85133702890 scopus 로고
    • Computational complexity of the m-center problems on the plane
    • S. Masuyama, T. Ibaraki, and T. Hasegawa. Computational complexity of the m-center problems on the plane. IEICE TRANSACTIONS, 1981.
    • (1981) Ieice Transactions
    • Masuyama, S.1    Ibaraki, T.2    Hasegawa, T.3
  • 32
    • 85133685910 scopus 로고    scopus 로고
    • Protecting location privacy against inference attacks
    • K. Minami and N. Borisov. Protecting location privacy against inference attacks. WPES '10.
    • Wpes '10
    • Minami, K.1    Borisov, N.2
  • 34
    • 33745825718 scopus 로고    scopus 로고
    • A PTAS for the Minimum Dominating Set Problem in Unit Disk Graphs
    • T. Nieberg and J. Hurink. A PTAS for the Minimum Dominating Set Problem in Unit Disk Graphs. In WAOA, 2006.
    • (2006) Waoa
    • Nieberg, T.1    Hurink, J.2
  • 36
    • 84921473283 scopus 로고    scopus 로고
    • The man who was there: Validating check-ins in location-based services
    • I. Polakis, S. Volanis, E. Athanasopoulos, and E. P. Markatos. The man who was there: validating check-ins in location-based services. In ACSAC 2013.
    • (2013) Acsac
    • Polakis, I.1    Volanis, S.2    Athanasopoulos, E.3    Markatos, E.P.4
  • 37
    • 85133649132 scopus 로고    scopus 로고
    • Preserving privacy in location-based mobile social applications
    • K. P. N. Puttaswamy and B. Y. Zhao. Preserving privacy in location-based mobile social applications. HotMobile '10.
    • HotMobile '10
    • Puttaswamy, K.P.N.1    Zhao, B.Y.2
  • 38
    • 85133703292 scopus 로고    scopus 로고
    • Playing hide and seek with mobile dating applications
    • G. Qin, C. Patsakis, and M. Bouroche. Playing hide and seek with mobile dating applications. In IFIP SEC '14.
    • Ifip Sec '14
    • Qin, G.1    Patsakis, C.2    Bouroche, M.3
  • 43
    • 33746638764 scopus 로고    scopus 로고
    • Eficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks
    • Y.-C. Wang, C.-C. Hu, and Y.-C. Tseng. Eficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks. In Wireless Internet, 2005.
    • (2005) Wireless Internet
    • Wang, Y.-C.1    Hu, C.-C.2    Tseng, Y.-C.3
  • 44
    • 85057714144 scopus 로고    scopus 로고
    • Human mobility enhances global positioning accuracy for mobile phone localization
    • Z. Yang, Y. Zhao, Y. Liu, and Y. Xu. Human mobility enhances global positioning accuracy for mobile phone localization. IEEE TPDS, 99:1, 2014.
    • (2014) Ieee Tpds , vol.99 , pp. 1
    • Yang, Z.1    Zhao, Y.2    Liu, Y.3    Xu, Y.4
  • 45
    • 84883092889 scopus 로고    scopus 로고
    • Checking in without worries: Location privacy in location based social networks
    • X. Zhao, L. Li, and G. Xue. Checking in without worries: Location privacy in location based social networks. In INFOCOM '13.
    • Infocom '13
    • Zhao, X.1    Li, L.2    Xue, G.3
  • 46
    • 77951287826 scopus 로고    scopus 로고
    • Louis, lester and pierre: Three protocols for location privacy
    • G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: Three protocols for location privacy. In PETS '07.
    • Pets '07
    • Zhong, G.1    Goldberg, I.2    Hengartner, U.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.