Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Proceedings of the 6th international conference on Mobile data management
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Providing location privacy in assisted living environments
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Privacy for real-time location-based services
SIGSPATIAL Special
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Enhancing WLAN location privacy using mobile behavior
Expert Systems with Applications: An International Journal
Location privacy protection on social networks
SBP'11 Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction
No Free Lunch: Price Premium for Privacy Seal-Bearing Vendors
Journal of Management Information Systems
Some security issues of wireless systems
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
A location-aware secure interworking architecture between 3GPP and WLAN systems
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
Hi-index | 4.10 |
Positioning technologies have the potential to intrude on personal privacy.