The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
Combining internet collected data to build personalised location based services
International Journal of Autonomous and Adaptive Communications Systems
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
A Hybrid Technique for Private Location-Based Queries with Database Protection
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Hiding stars with fireworks: location privacy through camouflage
Proceedings of the 15th annual international conference on Mobile computing and networking
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Preventing velocity-based linkage attacks in location-aware applications
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Finding mobile data: efficiency vs. location inaccuracy
ESA'07 Proceedings of the 15th annual European conference on Algorithms
Location privacy in geospatial decision-making
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Opportunistic alignment of advertisement delivery with cellular basestation overloads
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
On the difficulty of achieving anonymity for Vehicle-2-X communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Privacy-preserving assessment of location data trustworthiness
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
A location-aware secure interworking architecture between 3GPP and WLAN systems
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
MaskIt: privately releasing user context streams for personalized mobile applications
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Grid-based cloaking area creation scheme supporting continuous location-based services
Proceedings of the 27th Annual ACM Symposium on Applied Computing
You can walk alone: trajectory privacy-preserving through significant stays protection
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
A context-aware scheme for privacy-preserving location-based services
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
Proceedings of the 4th ACM conference on Data and application security and privacy
Balancing trajectory privacy and data utility using a personalized anonymization model
Journal of Network and Computer Applications
Hi-index | 0.00 |
Although some users might willingly subscribe to location-tracking services, few would be comfortable having their location known in all situations. The authors investigate disclosure control algorithms that hide users' positions in sensitive areas and withhold path information that indicates which areas they have visited.