Information technology and dataveillance
Communications of the ACM
Computation and Human Experience
Computation and Human Experience
Computer
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
iOS Forensic Analysis: for iPhone, iPad, and iPod touch
iOS Forensic Analysis: for iPhone, iPad, and iPod touch
Cellular telephony and the question of privacy
Communications of the ACM
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Hi-index | 48.22 |
How to have the best of location-based services while avoiding the growing threat to personal privacy.