An Effective Target Recovery Method from a Source Location in Geo-Indistinguishable Surroundings
- 28 April 2020
- book chapter
- Published by Springer Nature in Advances in Intelligent Systems and Computing
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent QueriesIEEE Transactions on Information Forensics and Security, 2017
- Geo-indistinguishabilityPublished by Association for Computing Machinery (ACM) ,2013
- Privacy protection for users of location-based servicesIEEE Wireless Communications, 2012
- Quantifying Location PrivacyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Show me how you move and I will tell you who you arePublished by Association for Computing Machinery (ACM) ,2010
- A survey of computational location privacyPersonal and Ubiquitous Computing, 2008
- Inference Attacks on Location TracksPublished by Springer Nature ,2007
- A Formal Model of Obfuscation and Negotiation for Location PrivacyLecture Notes in Computer Science, 2005
- Protecting Privacy Against Location-Based Personal IdentificationLecture Notes in Computer Science, 2005
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003