Password authentication with insecure communication
Communications of the ACM
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Off-Line Generation of Limited-Use Credit Card Numbers
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
A table driven approach to cyclic redundancy check calculations
ACM SIGCOMM Computer Communication Review
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Independent one-time passwords
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
A pervasive identification service for physical access control
Proceedings of the 5th international conference on Pervasive services
Secure remote user access over insecure networks
Computer Communications
Securing credit card transactions with one-time payment scheme
Electronic Commerce Research and Applications
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
New remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
In health assistive environments the possibility of knowing patient's position can be very important, since may represent a valid support to medical activities and assistance strategies. However, we cannot assume in general that the utility of having precise information about patients' location is stronger than the right of keeping private the access to some place and, more in general, the exact movements that patients do in the environment. Thus, besides the standard precise localization issue, we consider also the issue of providing approximate non-deterministic answers about patients' positions in such a way that privacy is protected but they can be anyway found with a small number of attempts. The solution enforces the general concept of k-anonymity, which we adapt in our context in a way different from the classical one. An important aspect of our technique is that it is strongly efficient and implementable via very cheap devices, which is a very relevant issue in pervasive environments where wireless devices with limited processing capability and power have to be utilized.