Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
The design and analysis of spatial data structures
The design and analysis of spatial data structures
The active badge location system
ACM Transactions on Information Systems (TOIS)
Providing location information in a ubiquitous computing environment (panel session)
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Enabling location-based applications
WMC '01 Proceedings of the 1st international workshop on Mobile commerce
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Location sensing and privacy in a context-aware computing environment
IEEE Wireless Communications
An overview of the challenges and progress in meeting the E-911 requirement for location service
IEEE Communications Magazine
Wireless hotspots: current challenges and future directions
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Data protection and data sharing in telematics
Mobile Networks and Applications
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Wireless identification -- privacy and security
BT Technology Journal
Secure context-sensitive authorization
Pervasive and Mobile Computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Wireless hotspots: current challenges and future directions
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Inverting sensor networks and actuating the environment for spatio-temporal access control
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
IEEE Pervasive Computing
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
A self-configuring privacy management architecture for pervasive systems
Proceedings of the 5th ACM international workshop on Mobility management and wireless access
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
A system for locating mobile terminals with tunable privacy
Journal of Theoretical and Applied Electronic Commerce Research
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Journal of Theoretical and Applied Electronic Commerce Research
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
A TTP-free protocol for location privacy in location-based services
Computer Communications
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
Privacy guaranteeing execution containers: one time use of personal data by location based services
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
Evaluating uncertain location-based spatial queries
Proceedings of the 2008 ACM symposium on Applied computing
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Adapting pervasive systems to multiuser privacy requirements
International Journal of Ad Hoc and Ubiquitous Computing
Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys
Computers in Human Behavior
Proceedings of the 5th international conference on Pervasive services
PLASMA: personalized, location aware services over mobile architectures
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Providing location privacy in assisted living environments
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Efficient security policy enforcement for the mobile environment
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
A frequency based sighting blurring algorithm for use with location based services on the internet
Proceedings of the 10th international conference on Human computer interaction with mobile devices and services
Seeing our signals: combining location traces and web-based models for personal discovery
Proceedings of the 9th workshop on Mobile computing systems and applications
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A Free Terrain Model for Trajectory K---Anonymity
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Special issue on privacy aware and location-based mobile services
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Toward a distributed k-anonymity protocol for location privacy
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Cloaking games in location based services
Proceedings of the 2008 ACM workshop on Secure web services
Shadow attacks on users' anonymity in pervasive computing environments
Pervasive and Mobile Computing
Source location privacy against laptop-class attacks in sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Towards Anonymous Mobile Community services
Journal of Network and Computer Applications
Privacy: preserving trajectory collection
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
A middleware for location-based mobile applications with privacy protection
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Understanding the privacy-efficiency trade-off in location based queries
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Towards a scalable model for location privacy
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Position transformation: a location privacy protection method for moving objects
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Privacy from promises to protection: privacy guaranteeing execution container
Mobile Networks and Applications
We saw each other on the subway: secure, anonymous proximity-based missed connections
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
An anonymous communication model for privacy-enhanced location based service using an echo agent
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
A scalable anonymous protocol for heterogeneous wireless ad hoc networks
Journal of Embedded Computing - Selected papers of EUC 2005
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
Towards a landmark influence framework to protect location privacy
Proceedings of the 2009 ACM symposium on Applied Computing
Information Security and Cryptology --- ICISC 2008
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks
Transactions on Computational Science IV
Managing uncertainty in location-based queries
Fuzzy Sets and Systems
Maximizing anonymity of a vehicle through pseudonym updation
Proceedings of the 4th Annual International Conference on Wireless Internet
StarTrack: a framework for enabling track-based applications
Proceedings of the 7th international conference on Mobile systems, applications, and services
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Location Privacy in Moving-Object Environments
Transactions on Data Privacy
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Towards Achieving Personalized Privacy for Location-Based Services
Transactions on Data Privacy
Realistic Driving Trips For Location Privacy
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Location Diversity: Enhanced Privacy Protection in Location Based Services
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Privacy for real-time location-based services
SIGSPATIAL Special
Privacy and location anonymization in location-based services
SIGSPATIAL Special
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
Foot-driven computing: our first glimpse of location privacy issues
SIGSPATIAL Special
A survey of computational location privacy
Personal and Ubiquitous Computing
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Location safety protection in ad hoc networks
Ad Hoc Networks
A Hybrid Technique for Private Location-Based Queries with Database Protection
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
A Location Privacy Aware Friend Locator
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Probabilistic adaptive anonymous authentication in vehicular networks
Journal of Computer Science and Technology
A distributed spatial index for error-prone wireless data broadcast
The VLDB Journal — The International Journal on Very Large Data Bases
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Physical Layer Attacks on Unlinkability in Wireless LANs
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Privacy-Aware Location Database Service for Granular Queries
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
PAD: privacy-area aware, dummy-based location privacy in mobile services
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access
Uncertainty Reduction in Location-Based Retrieval of Georeferenced Web Resources by Moving Users
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
VTrack: accurate, energy-aware road traffic delay estimation using mobile phones
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Navigational path privacy protection: navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
Preventing velocity-based linkage attacks in location-aware applications
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Distortion-based anonymity for continuous queries in location-based mobile services
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Protecting location privacy against spatial inferences: the PROBE approach
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Location-dependent query processing: Where we are and where we are heading
ACM Computing Surveys (CSUR)
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
A reciprocal framework for spatial K-anonymity
Information Systems
Security analysis of the Louis protocol for location privacy
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A two-level protocol to answer private location-basedqueries
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
A new scheme of LBS privacy protection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Mobile Networks and Applications
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
Private location-based information retrieval through user collaboration
Computer Communications
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Outdoor distributed computing with split smart messages
Proceedings of the 12th Monterey conference on Reliable systems on unreliable networked platforms
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Louis, Lester and Pierre: three protocols for location privacy
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Efficient oblivious augmented maps: location-based services with a payment broker
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Location privacy in geospatial decision-making
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
Enhancing privacy by applying information flow modelling in pervasive systems
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Managing pervasive environment privacy using the "fair trade" metaphor
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Scalable inter-vehicular applications
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Quality aware privacy protection for location-based services
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Scalable processing of spatial alarms
HiPC'08 Proceedings of the 15th international conference on High performance computing
Privacy-aware location data publishing
ACM Transactions on Database Systems (TODS)
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference
Context quality and privacy - friends or rivals?
QuaCon'09 Proceedings of the 1st international conference on Quality of context
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Trust-based data disclosure in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Preserving privacy for location-based services with continuous queries
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Wireless location privacy protection in vehicular ad-hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Privacy preserving through a memorizing algorithm in location-based services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Measuring long-term location privacy in vehicular communication systems
Computer Communications
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Enabling search services on outsourced private spatial data
The VLDB Journal — The International Journal on Very Large Data Bases
Anonymization of moving objects databases by clustering and perturbation
Information Systems
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Privacy vulnerability of published anonymous mobility traces
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Event-based communication for location-based service collaboration
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Proceedings of the 12th ACM international conference on Ubiquitous computing
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Towards location-based social networking services
Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks
Moving forward: location privacy and location awareness
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A new cloaking algorithm using Hilbert curves for privacy protection
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
P2-CTM: privacy preserving collaborative traffic monitoring
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Privacy issues in location-aware browsing
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Achieving efficient query privacy for location based services
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Providing K-Anonymity in location based services
ACM SIGKDD Explorations Newsletter
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
LocPriS: a security and privacy preserving location based services development framework
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV
Coordinate transformation - a solution for the privacy problem of location based services?
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Anonymity preserving framework for location-based information services
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
Tracking games in mobile networks
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
An experimental comparison of source location privacy methods for power optimization in WSNs
SENSIG '10/MATERIALS'10 Proceedings of the 3rd WSEAS international conference on Advances in sensors, signals and materials
A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Anonymous, secure and fair protocol to access location-based services subject to payment
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Towards communication-efficient private location dependent queries
Proceedings of the 2011 ACM Symposium on Applied Computing
Privacy-aware collection of aggregate spatial data
Data & Knowledge Engineering
Anonymous mobile service collaboration: quality of service
From active data management to event-based systems and more
Query-aware location anonymization for road networks
Geoinformatica
Real-time trip information service for a large taxi fleet
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Third party geolocation services in LBS: privacy requirements and research issues
Transactions on Data Privacy
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
Protecting location privacy using location semantics
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Produre: A novel proximity discovery mechanism in location tagging system
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
On the difficulty of achieving anonymity for Vehicle-2-X communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
History trajectory privacy-preserving through graph partition
Proceedings of the 1st international workshop on Mobile location-based service
Privacy-aware mobile location-based systems
Proceedings of the 1st international workshop on Mobile location-based service
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
The VLDB Journal — The International Journal on Very Large Data Bases
Design guidelines for mobile group recommender systems to handle inaccurate or missing location data
Proceedings of the fifth ACM conference on Recommender systems
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
A moving-object index for efficient query processing with peer-wise location privacy
Proceedings of the VLDB Endowment
Assessing location privacy in mobile communication networks
ISC'11 Proceedings of the 14th international conference on Information security
A privacy preserving system for friend locator applications
Proceedings of the 9th ACM international symposium on Mobility management and wireless access
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
SBNMA '11 Proceedings of the 2011 ACM workshop on Social and behavioural networked media access
Proceedings of the Seventh Symposium on Usable Privacy and Security
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
Threats to security in DSRC/WAVE
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Privacy-preserving assessment of location data trustworthiness
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
An effective method for location privacy in ubiquitous computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A privacy-aware service protocol for ubiquitous computing environments
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Measuring query privacy in location-based services
Proceedings of the second ACM conference on Data and Application Security and Privacy
Protecting user data in ubiquitous computing: towards trustworthy environments
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A legal ontology to support privacy preservation in location-based services
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Privacy for profitable location based services
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Abstraction for privacy in context-aware environments
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
A spatial cloaking framework based on range search for nearest neighbor search
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Preserving location privacy for continuous queries on known route
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Towards modeling wireless location privacy
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
The impact of trace and adversary models on location privacy provided by K-anonymity
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Silent cascade: enhancing location privacy without communication QoS degradation
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Selective location blinding using hash chains
SP'11 Proceedings of the 19th international conference on Security Protocols
An open design privacy-enhancing platform supporting location-based applications
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
ACM SIGAPP Applied Computing Review
Transactions on Data Privacy
MaskIt: privately releasing user context streams for personalized mobile applications
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Indistinguishable regions in geographic privacy
Proceedings of the 27th Annual ACM Symposium on Applied Computing
The loss of location privacy in the cellular age
Communications of the ACM
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
Grid-based cloaking area creation scheme supporting continuous location-based services
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Some open issues on internetworking for the next generation
Computer Communications
Software abstractions for trusted sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
Towards planet-scale localization on smartphones with a partial radiomap
Proceedings of the 4th ACM international workshop on Hot topics in planet-scale measurement
A context-aware scheme for privacy-preserving location-based services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Location privacy in relation to trusted peers
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Security solutions for highly dynamic car2x networks in the KoFAS initiative
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
CMOA: continuous moving object anonymization
Proceedings of the 16th International Database Engineering & Applications Sysmposium
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Uniform obfuscation for location privacy
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Multiparty proximity testing with dishonest majority from equality testing
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part II
Journal of Systems Architecture: the EUROMICRO Journal
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Secure and privacy-preserving, timed vehicular communications
International Journal of Ad Hoc and Ubiquitous Computing
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
Privacy-aware personalization for mobile advertising
Proceedings of the 2012 ACM conference on Computer and communications security
On location privacy and quality of information in participatory sensing
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
Privacy protection in location-based services through a public-key privacy homomorphism
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Context-aware efficient message propagation
Proceedings of the 11th International Workshop on Adaptive and Reflective Middleware
Hilbert-order based spatial cloaking algorithm in road network
Concurrency and Computation: Practice & Experience
A dummy-based anonymization method based on user trajectory with pauses
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Location privacy policy management system
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Exploring dependency for query privacy protection in location-based services
Proceedings of the third ACM conference on Data and application security and privacy
Linking anonymous location traces through driving characteristics
Proceedings of the third ACM conference on Data and application security and privacy
Protecting User Privacy Better with Query l-Diversity
International Journal of Information Security and Privacy
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
K-anonymity in indoor spaces through hierarchical graphs
Proceedings of the Fourth ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
Predictive spatio-temporal queries: a comprehensive survey and future directions
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
International Journal of Mobile Computing and Multimedia Communications
A cooperative method for privacy preservation in real-time location monitoring services
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Providing Users’ Anonymity in Mobile Hybrid Networks
ACM Transactions on Internet Technology (TOIT)
Differential privacy in intelligent transportation systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Secure cloud-assisted location based reminder
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Private proximity detection and monitoring with vicinity regions
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Protecting privacy for group nearest neighbor queries with crowdsourced data and computing
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
Toward preserving privacy and functionality in geosocial networks
Proceedings of the 19th annual international conference on Mobile computing & networking
Scalable Data Processing for Community Sensing Applications
Mobile Networks and Applications
ACM SIGMOBILE Mobile Computing and Communications Review
Interest-based cloud-facilitated opportunistic networking
Proceedings of the 8th ACM MobiCom workshop on Challenged networks
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
A hybrid approach for privacy-preserving processing of knn queries in mobile database systems
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Geo-indistinguishability: differential privacy for location-based systems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
A privacy-preserving location-based alert system
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
Relative Location Oriented Mobile LBS
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
Proceedings of the 4th ACM conference on Data and application security and privacy
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
Balancing trajectory privacy and data utility using a personalized anonymization model
Journal of Network and Computer Applications
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Protecting query privacy in location-based services
Geoinformatica
Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Anonymizing continuous queries with delay-tolerant mix-zones over road networks
Distributed and Parallel Databases
A profile anonymization model for location-based services
Journal of Computer Security
Hi-index | 0.02 |