The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
The active badge location system
ACM Transactions on Information Systems (TOIS)
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Security: for ubiquitous computing
Security: for ubiquitous computing
Anonymous Addresses and Confidentiality of Location
Proceedings of the First International Workshop on Information Hiding
Middleware Support for Context-Aware Multimedia Applications
Proceedings of the IFIP TC6 / WG6.1 Third International Working Conference on New Developments in Distributed Applications and Interoperable Systems
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Accommodating paper in document databases
Proceedings of the 2004 ACM symposium on Document engineering
IEEE Pervasive Computing
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Secure context-sensitive authorization
Pervasive and Mobile Computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Applying privacy on the dissemination of location information
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms
Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Report from the clean slate network research post-sigcomm 2006 workshop
ACM SIGCOMM Computer Communication Review
A mobile application framework for the geospatial web
Proceedings of the 16th international conference on World Wide Web
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
A system for locating mobile terminals with tunable privacy
Journal of Theoretical and Applied Electronic Commerce Research
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Privacy in the Age of Transparency
Social Science Computer Review
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
RFID tags: privacy and security aspects
International Journal of Mobile Communications
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Evaluating uncertain location-based spatial queries
Proceedings of the 2008 ACM symposium on Applied computing
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership
Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Proceedings of the 5th international conference on Pervasive services
Providing location privacy in assisted living environments
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
A frequency based sighting blurring algorithm for use with location based services on the internet
Proceedings of the 10th international conference on Human computer interaction with mobile devices and services
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Access control over uncertain data
Proceedings of the VLDB Endowment
Shadow attacks on users' anonymity in pervasive computing environments
Pervasive and Mobile Computing
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Multi-dimensional online tracking
SODA '09 Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms
Position transformation: a location privacy protection method for moving objects
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Information Security and Cryptology --- ICISC 2008
Managing uncertainty in location-based queries
Fuzzy Sets and Systems
Wifi-reports: improving wireless network selection with collaboration
Proceedings of the 7th international conference on Mobile systems, applications, and services
Location Privacy in Moving-Object Environments
Transactions on Data Privacy
Anonymizing location-based RFID data
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Privacy for real-time location-based services
SIGSPATIAL Special
Privacy and location anonymization in location-based services
SIGSPATIAL Special
Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
A survey of computational location privacy
Personal and Ubiquitous Computing
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Location safety protection in ad hoc networks
Ad Hoc Networks
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
A hybrid positioning system for technology-independent location-aware computing
Software—Practice & Experience
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
Agent-oriented privacy-based information brokering architecture for healthcare environments
International Journal of Telemedicine and Applications - Special issue on electronic health
Hiding stars with fireworks: location privacy through camouflage
Proceedings of the 15th annual international conference on Mobile computing and networking
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
A Secure Framework for Location Verification in Pervasive Computing
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Privacy-Aware Location Database Service for Granular Queries
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
An adaptive and safe ubicomp for HPC applications
International Journal of Ad Hoc and Ubiquitous Computing
Uncertainty Reduction in Location-Based Retrieval of Georeferenced Web Resources by Moving Users
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Sentient bikes for collecting mobility traces in opportunistic networks
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
A proposal for secure vehicular communications
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
BAT: a robust signature scheme for vehicular networks using binary authentication tree
IEEE Transactions on Wireless Communications
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
A reciprocal framework for spatial K-anonymity
Information Systems
Location privacy enforcement in a location-based services platform
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Poster Abstract: CacheCloak: enabling realtime location privacy for mobile users
ACM SIGMOBILE Mobile Computing and Communications Review
Moving towards inclusive design guidelines for socially and ethically aware HCI
Interacting with Computers
A trusted decentralized access control framework for the client/server architecture
Journal of Network and Computer Applications
A location privacy metric for V2X communication systems
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
A new scheme of LBS privacy protection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Multi-modal authentication for ubiquitous computing environments
UAHCI'07 Proceedings of the 4th international conference on Universal access in human-computer interaction: ambient interaction
Security for whom? the shifting security assumptions of pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Fundamentals of inclusive HCI design
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The effects of mutual location-awareness on group coordination
International Journal of Human-Computer Studies
Efficient oblivious augmented maps: location-based services with a payment broker
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Location privacy in geospatial decision-making
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
A novel adaptive and safe framework for ubicomp
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Quality aware privacy protection for location-based services
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Context quality and privacy - friends or rivals?
QuaCon'09 Proceedings of the 1st international conference on Quality of context
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Anonymous and authenticated routing in multi-hop cellular networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Preserving privacy for location-based services with continuous queries
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Privacy preserving through a memorizing algorithm in location-based services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Measuring long-term location privacy in vehicular communication systems
Computer Communications
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Privacy enhancements for mobile and social uses of consumer electronics
IEEE Communications Magazine
Anti-localization anonymous routing for Delay Tolerant Network
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Proceedings of the Sixth Symposium on Usable Privacy and Security
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
Enhancing WLAN location privacy using mobile behavior
Expert Systems with Applications: An International Journal
Proceedings of the 12th ACM international conference on Ubiquitous computing
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Privacy issues in location-aware browsing
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A user location anonymization method for location based services in a real environment
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
FAW'10 Proceedings of the 4th international conference on Frontiers in algorithmics
Formal analysis of privacy for vehicular mix-zones
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
LocPriS: a security and privacy preserving location based services development framework
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV
Coordinate transformation - a solution for the privacy problem of location based services?
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Privacy management and control in ATRACO
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Dynamic privacy management in pervasive sensor networks
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
NP-completeness of spreading colored points
COCOA'10 Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part I
Tracking games in mobile networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
OREN: Optimal revocations in ephemeral networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Short paper: a practical view of "mixing" identities in vehicular networks
Proceedings of the fourth ACM conference on Wireless network security
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices
MobiArch '11 Proceedings of the sixth international workshop on MobiArch
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract
Transactions on Data Privacy
Third party geolocation services in LBS: privacy requirements and research issues
Transactions on Data Privacy
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
On some geometric problems of color-spanning sets
FAW-AAIM'11 Proceedings of the 5th joint international frontiers in algorithmics, and 7th international conference on Algorithmic aspects in information and management
Evaluating user-centered privacy model (UPM) in pervasive computing systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
On the difficulty of achieving anonymity for Vehicle-2-X communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Building secure robot applications
HotSec'11 Proceedings of the 6th USENIX conference on Hot topics in security
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Largest area convex hull of axis-aligned squares based on imprecise data
COCOON'11 Proceedings of the 17th annual international conference on Computing and combinatorics
Multi-objective optimal combination queries
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Location privacy protection in the presence of users' preferences
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Optimizing mixing in pervasive networks: a graph-theoretic perspective
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Assessing location privacy in mobile communication networks
ISC'11 Proceedings of the 14th international conference on Information security
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
A comparative privacy analysis of geosocial networks
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
SBNMA '11 Proceedings of the 2011 ACM workshop on Social and behavioural networked media access
A survey on privacy problems and solutions for VANET based on network model
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Proceedings of the Seventh Symposium on Usable Privacy and Security
ROAMER: Roadside Units as message routers in VANETs
Ad Hoc Networks
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Scalability in a secure distributed proof system
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
DALMA – location aware alarm system for people with disabilities
ICCHP'06 Proceedings of the 10th international conference on Computers Helping People with Special Needs
Ethically aware design of a location system for people with dementia
ICCHP'06 Proceedings of the 10th international conference on Computers Helping People with Special Needs
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Safe authentication method for security communication in ubiquitous
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
An effective method for location privacy in ubiquitous computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A privacy-aware service protocol for ubiquitous computing environments
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Location privacy in mobile computing environments
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Incorporating privacy policy into an anonymity-based privacy-preserving ID-Based service platform
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A legal ontology to support privacy preservation in location-based services
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Multidimensional online tracking
ACM Transactions on Algorithms (TALG)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Secure identity management for pseudo-anonymous service access
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Privacy for profitable location based services
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
A new scheme for the location information protection in mobile communication environments
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
A location-aware secure interworking architecture between 3GPP and WLAN systems
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Privacy aware publishing of successive location information in sensor networks
Future Generation Computer Systems
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Impact of pseudonym changes on geographic routing in VANETs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Preserving location privacy for continuous queries on known route
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Securing publish/subscribe for multi-domain systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Towards modeling wireless location privacy
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Silent cascade: enhancing location privacy without communication QoS degradation
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Friends radar: towards a private P2P location sharing platform
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
Shortest path computation with no information leakage
Proceedings of the VLDB Endowment
Authenticating location-based services without compromising location privacy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
AMORES: an architecture for mobiquitous resilient systems
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience
Indistinguishable regions in geographic privacy
Proceedings of the 27th Annual ACM Symposium on Applied Computing
An overview of anonymous communications in mobile ad hoc networks
Wireless Communications & Mobile Computing
Verifying location-based services with declassification enforcement
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
Location privacy in relation to trusted peers
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Uniform obfuscation for location privacy
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Big brother knows your friends: on privacy of social communities in pervasive networks
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
Journal of Network and Computer Applications
Dissent in numbers: making strong anonymity scale
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
An information aggregation scheme of multi-node in ubiquitous sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
A content-driven framework for geolocating microblog users
ACM Transactions on Intelligent Systems and Technology (TIST) - Special section on twitter and microblogging services, social recommender systems, and CAMRa2010: Movie recommendation in context
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
Privacy-aware geolocation interfaces for volunteered geography: a case study
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Crowdsourced and Volunteered Geographic Information
Techniques to protect privacy against inference attacks in location based services
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
International Journal of Mobile Computing and Multimedia Communications
Middleware for pervasive computing: A survey
Pervasive and Mobile Computing
Privacy-by-design rules in face recognition system
Neurocomputing
Private proximity testing with an untrusted server
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Private proximity detection and monitoring with vicinity regions
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
The influential factors for the variation of data sensitivity in ubiquitous social networking
International Journal of Wireless and Mobile Computing
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
On some geometric problems of color-spanning sets
Journal of Combinatorial Optimization
Inferring social ties in academic networks using short-range wireless communications
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Location anonymization using real car trace data for location based services
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Largest area convex hull of imprecise data based on axis-aligned squares
Journal of Combinatorial Optimization
Anonymizing continuous queries with delay-tolerant mix-zones over road networks
Distributed and Parallel Databases
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
The authors protect location privacy using mix zonesýa new construction comparable to the mix nodes used for anonymous communications. They discuss two quantitative location privacy metrics they developed based on mix zones and demonstrate their use on a three-million-sample database of real location data from the Active Bat system.