A Formal Model of Obfuscation and Negotiation for Location Privacy
Top Cited Papers
- 1 January 2005
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 152-170
- https://doi.org/10.1007/11428572_10
Abstract
No abstract availableKeywords
This publication has 29 references indexed in Scilit:
- A Methodological Assessment of Location Privacy Risks in Wireless Hotspot NetworksPublished by Springer Nature ,2004
- Tor: The Second-Generation Onion RouterPublished by Defense Technical Information Center (DTIC) ,2004
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003
- Imprecise NavigationGeoInformatica, 2003
- Framework for security and privacy in automotive telematicsPublished by Association for Computing Machinery (ACM) ,2002
- Privacy in ContextHuman–Computer Interaction, 2001
- GeoNotes: Social and Navigational Aspects of Location-Based Information SystemsLecture Notes in Computer Science, 2001
- A formal approach to imperfection in geographic informationComputers, Environment and Urban Systems, 2001
- Privacy in e-commercePublished by Association for Computing Machinery (ACM) ,1999