219 lines
7.6 KiB
BibTeX
219 lines
7.6 KiB
BibTeX
@article{sweeney_k-anonymity_2002,
|
|
title = {k-Anonymity: A Model for Protecting Privacy},
|
|
volume = {10},
|
|
doi = {10.1142/S0218488502001648},
|
|
shorttitle = {k-Anonymity},
|
|
pages = {557--570},
|
|
number = {5},
|
|
journaltitle = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
|
|
shortjournal = {Int. J. Uncertain. Fuzziness Knowl.-Based Syst.},
|
|
author = {Sweeney, Latanya},
|
|
date = {2002-10-01},
|
|
}
|
|
|
|
@inproceedings{gruteser_anonymous_2003,
|
|
title = {Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking},
|
|
eventtitle = {First International Conference on Mobile Systems, Applications, and Services ({MobiSys}2003)},
|
|
publisher = {{USENIX} Association},
|
|
author = {Gruteser, Marco and Grunwald, Dirk},
|
|
date = {2003},
|
|
}
|
|
|
|
@inproceedings{balasch_pretp_2010,
|
|
location = {{USA}},
|
|
title = {{PrETP}: Privacy-preserving Electronic Toll Pricing},
|
|
series = {{USENIX} Security'10},
|
|
shorttitle = {{PrETP}},
|
|
pages = {5},
|
|
booktitle = {Proceedings of the 19th {USENIX} conference on Security},
|
|
publisher = {{USENIX} Association},
|
|
author = {Balasch, Josep and Rial, Alfredo and Troncoso, Carmela and Preneel, Bart and Verbauwhede, Ingrid and Geuens, Christophe},
|
|
date = {2010-08-11},
|
|
}
|
|
|
|
@article{thompson_twelve_2019,
|
|
title = {Twelve Million Phones, One Dataset, Zero Privacy},
|
|
url = {https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html},
|
|
abstract = {What we learned from the spy in your pocket.},
|
|
journaltitle = {The New York Times},
|
|
author = {Thompson, Stuart A. and Warzel, Charlie},
|
|
urldate = {2022-02-10},
|
|
date = {2019-12-19},
|
|
}
|
|
|
|
@inproceedings{kido_protection_2005,
|
|
title = {Protection of Location Privacy using Dummies for Location-based Services},
|
|
doi = {10.1109/ICDE.2005.269},
|
|
eventtitle = {21st International Conference on Data Engineering Workshops ({ICDEW}'05)},
|
|
pages = {1248--1248},
|
|
booktitle = {21st International Conference on Data Engineering Workshops ({ICDEW}'05)},
|
|
author = {Kido, H. and Yanagisawa, Y. and Satoh, T.},
|
|
date = {2005-04},
|
|
}
|
|
|
|
@article{shin_privacy_2012,
|
|
title = {Privacy protection for users of location-based services},
|
|
volume = {19},
|
|
issn = {1558-0687},
|
|
doi = {10.1109/MWC.2012.6155874},
|
|
pages = {30--39},
|
|
number = {1},
|
|
journaltitle = {{IEEE} Wireless Communications},
|
|
author = {Shin, Kang G. and Ju, Xiaoen and Chen, Zhigang and Hu, Xin},
|
|
date = {2012-02},
|
|
}
|
|
|
|
@inproceedings{pingley_protection_2011,
|
|
title = {Protection of query privacy for continuous location based services},
|
|
doi = {10.1109/INFCOM.2011.5934968},
|
|
eventtitle = {2011 Proceedings {IEEE} {INFOCOM}},
|
|
pages = {1710--1718},
|
|
booktitle = {2011 Proceedings {IEEE} {INFOCOM}},
|
|
author = {Pingley, Aniket and Zhang, Nan and Fu, Xinwen and Choi, Hyeong-Ah and Subramaniam, Suresh and Zhao, Wei},
|
|
date = {2011-04},
|
|
}
|
|
|
|
@inproceedings{chor_private_1995,
|
|
title = {Private information retrieval},
|
|
doi = {10.1109/SFCS.1995.492461},
|
|
eventtitle = {Proceedings of {IEEE} 36th Annual Foundations of Computer Science},
|
|
pages = {41--50},
|
|
booktitle = {Proceedings of {IEEE} 36th Annual Foundations of Computer Science},
|
|
author = {Chor, B. and Goldreich, O. and Kushilevitz, E. and Sudan, M.},
|
|
date = {1995-10},
|
|
}
|
|
|
|
@incollection{GAJJAR2017223,
|
|
title = {Chapter 9 -- Sensor security and location privacy},
|
|
editor = {Manish J. Gajjar},
|
|
booktitle = {Mobile Sensors and Context-Aware Computing},
|
|
publisher = {Morgan Kaufmann},
|
|
pages = {223-265},
|
|
year = {2017},
|
|
doi = {https://doi.org/10.1016/B978-0-12-801660-2.00009-4},
|
|
author = {Manish J. Gajjar},
|
|
}
|
|
|
|
@article{Wernke2012ACO,
|
|
title={A classification of location privacy attacks and approaches},
|
|
author={Marius Wernke and Pavel Skvortsov and Frank D{\"u}rr and Kurt Rothermel},
|
|
journal={Personal and Ubiquitous Computing},
|
|
year={2012},
|
|
volume={18},
|
|
pages={163-175}
|
|
}
|
|
|
|
@article{8085391,
|
|
title={Achieving Effective $k$-Anonymity for Query Privacy in Location-Based Services},
|
|
author={Wang, Jinbao and Li, Yingshu and Yang, Donghua and Gao, Hong and Luo, Guangchun and Li, Jianzhong},
|
|
journal={IEEE Access},
|
|
year={2017},
|
|
volume={5},
|
|
number={},
|
|
pages={24580-24592},
|
|
doi={10.1109/ACCESS.2017.2766669}
|
|
}
|
|
|
|
@Article{Wu2021,
|
|
author={Wu, Zongda and Li, Guiling and Shen, Shigen and Lian, Xinze and Chen, Enhong and Xu, Guandong},
|
|
title={Constructing dummy query sequences to protect location privacy and query privacy in location-based services},
|
|
journal={World Wide Web},
|
|
year={2021},
|
|
month={Jan},
|
|
day={01},
|
|
volume={24},
|
|
number={1},
|
|
pages={25-49},
|
|
doi={10.1007/s11280-020-00830-x},
|
|
}
|
|
|
|
@article{gkoulalas-divanis_providing_2010,
|
|
title = {Providing K-Anonymity in location based services},
|
|
volume = {12},
|
|
issn = {1931-0145},
|
|
doi = {10.1145/1882471.1882473},
|
|
pages = {3--10},
|
|
number = {1},
|
|
journaltitle = {{ACM} {SIGKDD} Explorations Newsletter},
|
|
shortjournal = {{SIGKDD} Explor. Newsl.},
|
|
author = {Gkoulalas-Divanis, Aris and Kalnis, Panos and Verykios, Vassilios S.},
|
|
date = {2010-11-09},
|
|
}
|
|
|
|
@article{ZHANG2018881,
|
|
title = {Enhancing privacy through uniform grid and caching in location-based services},
|
|
journal = {Future Generation Computer Systems},
|
|
volume = {86},
|
|
pages = {881-892},
|
|
year = {2018},
|
|
doi = {https://doi.org/10.1016/j.future.2017.06.022},
|
|
author = {Shaobo Zhang and Kim-Kwang Raymond Choo and Qin Liu and Guojun Wang},
|
|
}
|
|
|
|
@article{DKM,
|
|
title = {A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services},
|
|
journal = {Information Sciences},
|
|
volume = {527},
|
|
pages = {406-419},
|
|
year = {2020},
|
|
doi = {https://doi.org/10.1016/j.ins.2019.05.054},
|
|
author = {Shaobo Zhang and Xinjun Mao and Kim-Kwang Raymond Choo and Tao Peng and Guojun Wang},
|
|
}
|
|
|
|
@article{DPP,
|
|
title={A Dual Privacy Preserving Scheme in Continuous Location-Based Services},
|
|
author={Zhang, Shaobo and Wang, Guojun and Bhuiyan, Md Zakirul Alam and Liu, Qin},
|
|
journal={IEEE Internet of Things Journal},
|
|
year={2018},
|
|
volume={5},
|
|
number={5},
|
|
pages={4191-4200},
|
|
doi={10.1109/JIOT.2018.2842470}
|
|
}
|
|
|
|
@article{PPCS,
|
|
title={Location Privacy Preservation for Mobile Users in Location-Based Services},
|
|
author={Sun, Gang and Cai, Shuai and Yu, Hongfang and Maharjan, Sabita and Chang, Victor and Du, Xiaojiang and Guizani, Mohsen},
|
|
journal={IEEE Access},
|
|
year={2019},
|
|
volume={7},
|
|
number={},
|
|
pages={87425-87438},
|
|
doi={10.1109/ACCESS.2019.2925571}
|
|
}
|
|
|
|
@article{mobilecrowd,
|
|
title={Hiding in the Mobile Crowd: LocationPrivacy through Collaboration},
|
|
author={Shokri, Reza and Theodorakopoulos, George and Papadimitratos, Panos and Kazemi, Ehsan and Hubaux, Jean-Pierre},
|
|
journal={IEEE Transactions on Dependable and Secure Computing},
|
|
year={2014},
|
|
volume={11},
|
|
number={3},
|
|
pages={266-279},
|
|
doi={10.1109/TDSC.2013.57}
|
|
}
|
|
@article{van2015real,
|
|
title={Real time localization of assets in hospitals using quuppa indoor positioning technology},
|
|
author={Van der Ham, Martijn},
|
|
year={2015}
|
|
}
|
|
@article{luo2018large,
|
|
title={A large-scale location-based social network to understanding the impact of human geo-social interaction patterns on vaccination strategies in an urbanized area},
|
|
author={Luo, Wei and Gao, Peng and Cassels, Susan},
|
|
journal={Computers, environment and urban systems},
|
|
volume={72},
|
|
pages={78--87},
|
|
year={2018},
|
|
publisher={Elsevier}
|
|
}
|
|
@article{wernke2014classification,
|
|
title={A classification of location privacy attacks and approaches},
|
|
author={Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt},
|
|
journal={Personal and ubiquitous computing},
|
|
volume={18},
|
|
number={1},
|
|
pages={163--175},
|
|
year={2014},
|
|
publisher={Springer}
|
|
}
|