Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Wireless identification -- privacy and security
BT Technology Journal
Supporting location-based conditions in access control policies
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
k-Unlinkability: A privacy protection model for distributed data
Data & Knowledge Engineering
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Providing location privacy in assisted living environments
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Efficient security policy enforcement for the mobile environment
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
ACM Transactions on Knowledge Discovery from Data (TKDD)
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services
Research in Cryptology
Measuring unlinkability revisited
Proceedings of the 7th ACM workshop on Privacy in the electronic society
An anonymous communication model for privacy-enhanced location based service using an echo agent
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
Information Security and Cryptology --- ICISC 2008
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
A mobility camouflaging evaluation tool
Proceedings of the 47th Annual Southeast Regional Conference
Privacy and location anonymization in location-based services
SIGSPATIAL Special
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Privacy now and in the age of ambient intelligence
International Journal of Electronic Security and Digital Forensics
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Navigational path privacy protection: navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management
Sampling urban mobility through on-line repositories of GPS tracks
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET
Information Security Applications
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Privacy preserving through a memorizing algorithm in location-based services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Distributed certificate and application architecture for VANETs
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Communication requirements for crash avoidance
Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Tracking games in mobile networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Privacy preserving spatio-temporal clustering on horizontally partitioned data
Ubiquitous knowledge discovery
Privacy preserving spatio-temporal clustering on horizontally partitioned data
Ubiquitous knowledge discovery
Short paper: a practical view of "mixing" identities in vehicular networks
Proceedings of the fourth ACM conference on Wireless network security
Evaluating user-centered privacy model (UPM) in pervasive computing systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Optimizing mixing in pervasive networks: a graph-theoretic perspective
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
A survey on privacy problems and solutions for VANET based on network model
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Efficient enforcement of security policies based on tracking of mobile users
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Privacy-preserving assessment of location data trustworthiness
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
An effective method for location privacy in ubiquitous computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Privacy preserving spatio-temporal clustering on horizontally partitioned data
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Unified index for mobile object data and authorizations
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Preserving location privacy for continuous queries on known route
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
CMOA: continuous moving object anonymization
Proceedings of the 16th International Database Engineering & Applications Sysmposium
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Linking anonymous location traces through driving characteristics
Proceedings of the third ACM conference on Data and application security and privacy
International Journal of Mobile Computing and Multimedia Communications
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
Privacy of personal location information is becoming an increasingly important issue. This paper refinesa method, called the mix zone, developed to enhance userprivacy in location-based services. We improve the mathematical model, examine and minimise computational complexity and develop a method of providing feedback to users.