Cover locations
- 17 October 2011
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 143-152
- https://doi.org/10.1145/2046556.2046576
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- On the limitations of query obfuscation techniques for location privacyPublished by Association for Computing Machinery (ACM) ,2011
- CachéACM SIGMOBILE Mobile Computing and Communications Review, 2010
- Spatial cloaking for anonymous location-based services in mobile peer-to-peer environmentsGeoInformatica, 2009
- Realistic Driving Trips For Location PrivacyLecture Notes in Computer Science, 2009
- Private queries in location based servicesPublished by Association for Computing Machinery (ACM) ,2008
- A peer-to-peer spatial cloaking algorithm for anonymous location-based servicePublished by Association for Computing Machinery (ACM) ,2006
- Enhancing Security and Privacy in Traffic-Monitoring SystemsIEEE Pervasive Computing, 2006
- A Formal Model of Obfuscation and Negotiation for Location PrivacyLecture Notes in Computer Science, 2005
- On the Anonymity of Periodic Location SamplesLecture Notes in Computer Science, 2005
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003