privacy-seminar/privacy-seminar.bib
2022-06-10 13:13:21 +02:00

219 lines
7.6 KiB
BibTeX

@article{sweeney_k-anonymity_2002,
title = {k-Anonymity: A Model for Protecting Privacy},
volume = {10},
doi = {10.1142/S0218488502001648},
shorttitle = {k-Anonymity},
pages = {557--570},
number = {5},
journaltitle = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
shortjournal = {Int. J. Uncertain. Fuzziness Knowl.-Based Syst.},
author = {Sweeney, Latanya},
date = {2002-10-01},
}
@inproceedings{gruteser_anonymous_2003,
title = {Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking},
eventtitle = {First International Conference on Mobile Systems, Applications, and Services ({MobiSys}2003)},
publisher = {{USENIX} Association},
author = {Gruteser, Marco and Grunwald, Dirk},
date = {2003},
}
@inproceedings{balasch_pretp_2010,
location = {{USA}},
title = {{PrETP}: Privacy-preserving Electronic Toll Pricing},
series = {{USENIX} Security'10},
shorttitle = {{PrETP}},
pages = {5},
booktitle = {Proceedings of the 19th {USENIX} conference on Security},
publisher = {{USENIX} Association},
author = {Balasch, Josep and Rial, Alfredo and Troncoso, Carmela and Preneel, Bart and Verbauwhede, Ingrid and Geuens, Christophe},
date = {2010-08-11},
}
@article{thompson_twelve_2019,
title = {Twelve Million Phones, One Dataset, Zero Privacy},
url = {https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html},
abstract = {What we learned from the spy in your pocket.},
journaltitle = {The New York Times},
author = {Thompson, Stuart A. and Warzel, Charlie},
urldate = {2022-02-10},
date = {2019-12-19},
}
@inproceedings{kido_protection_2005,
title = {Protection of Location Privacy using Dummies for Location-based Services},
doi = {10.1109/ICDE.2005.269},
eventtitle = {21st International Conference on Data Engineering Workshops ({ICDEW}'05)},
pages = {1248--1248},
booktitle = {21st International Conference on Data Engineering Workshops ({ICDEW}'05)},
author = {Kido, H. and Yanagisawa, Y. and Satoh, T.},
date = {2005-04},
}
@article{shin_privacy_2012,
title = {Privacy protection for users of location-based services},
volume = {19},
issn = {1558-0687},
doi = {10.1109/MWC.2012.6155874},
pages = {30--39},
number = {1},
journaltitle = {{IEEE} Wireless Communications},
author = {Shin, Kang G. and Ju, Xiaoen and Chen, Zhigang and Hu, Xin},
date = {2012-02},
}
@inproceedings{pingley_protection_2011,
title = {Protection of query privacy for continuous location based services},
doi = {10.1109/INFCOM.2011.5934968},
eventtitle = {2011 Proceedings {IEEE} {INFOCOM}},
pages = {1710--1718},
booktitle = {2011 Proceedings {IEEE} {INFOCOM}},
author = {Pingley, Aniket and Zhang, Nan and Fu, Xinwen and Choi, Hyeong-Ah and Subramaniam, Suresh and Zhao, Wei},
date = {2011-04},
}
@inproceedings{chor_private_1995,
title = {Private information retrieval},
doi = {10.1109/SFCS.1995.492461},
eventtitle = {Proceedings of {IEEE} 36th Annual Foundations of Computer Science},
pages = {41--50},
booktitle = {Proceedings of {IEEE} 36th Annual Foundations of Computer Science},
author = {Chor, B. and Goldreich, O. and Kushilevitz, E. and Sudan, M.},
date = {1995-10},
}
@incollection{GAJJAR2017223,
title = {Chapter 9 -- Sensor security and location privacy},
editor = {Manish J. Gajjar},
booktitle = {Mobile Sensors and Context-Aware Computing},
publisher = {Morgan Kaufmann},
pages = {223-265},
year = {2017},
doi = {https://doi.org/10.1016/B978-0-12-801660-2.00009-4},
author = {Manish J. Gajjar},
}
@article{Wernke2012ACO,
title={A classification of location privacy attacks and approaches},
author={Marius Wernke and Pavel Skvortsov and Frank D{\"u}rr and Kurt Rothermel},
journal={Personal and Ubiquitous Computing},
year={2012},
volume={18},
pages={163-175}
}
@article{8085391,
title={Achieving Effective $k$-Anonymity for Query Privacy in Location-Based Services},
author={Wang, Jinbao and Li, Yingshu and Yang, Donghua and Gao, Hong and Luo, Guangchun and Li, Jianzhong},
journal={IEEE Access},
year={2017},
volume={5},
number={},
pages={24580-24592},
doi={10.1109/ACCESS.2017.2766669}
}
@Article{Wu2021,
author={Wu, Zongda and Li, Guiling and Shen, Shigen and Lian, Xinze and Chen, Enhong and Xu, Guandong},
title={Constructing dummy query sequences to protect location privacy and query privacy in location-based services},
journal={World Wide Web},
year={2021},
month={Jan},
day={01},
volume={24},
number={1},
pages={25-49},
doi={10.1007/s11280-020-00830-x},
}
@article{gkoulalas-divanis_providing_2010,
title = {Providing K-Anonymity in location based services},
volume = {12},
issn = {1931-0145},
doi = {10.1145/1882471.1882473},
pages = {3--10},
number = {1},
journaltitle = {{ACM} {SIGKDD} Explorations Newsletter},
shortjournal = {{SIGKDD} Explor. Newsl.},
author = {Gkoulalas-Divanis, Aris and Kalnis, Panos and Verykios, Vassilios S.},
date = {2010-11-09},
}
@article{ZHANG2018881,
title = {Enhancing privacy through uniform grid and caching in location-based services},
journal = {Future Generation Computer Systems},
volume = {86},
pages = {881-892},
year = {2018},
doi = {https://doi.org/10.1016/j.future.2017.06.022},
author = {Shaobo Zhang and Kim-Kwang Raymond Choo and Qin Liu and Guojun Wang},
}
@article{DKM,
title = {A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services},
journal = {Information Sciences},
volume = {527},
pages = {406-419},
year = {2020},
doi = {https://doi.org/10.1016/j.ins.2019.05.054},
author = {Shaobo Zhang and Xinjun Mao and Kim-Kwang Raymond Choo and Tao Peng and Guojun Wang},
}
@article{DPP,
title={A Dual Privacy Preserving Scheme in Continuous Location-Based Services},
author={Zhang, Shaobo and Wang, Guojun and Bhuiyan, Md Zakirul Alam and Liu, Qin},
journal={IEEE Internet of Things Journal},
year={2018},
volume={5},
number={5},
pages={4191-4200},
doi={10.1109/JIOT.2018.2842470}
}
@article{PPCS,
title={Location Privacy Preservation for Mobile Users in Location-Based Services},
author={Sun, Gang and Cai, Shuai and Yu, Hongfang and Maharjan, Sabita and Chang, Victor and Du, Xiaojiang and Guizani, Mohsen},
journal={IEEE Access},
year={2019},
volume={7},
number={},
pages={87425-87438},
doi={10.1109/ACCESS.2019.2925571}
}
@article{mobilecrowd,
title={Hiding in the Mobile Crowd: LocationPrivacy through Collaboration},
author={Shokri, Reza and Theodorakopoulos, George and Papadimitratos, Panos and Kazemi, Ehsan and Hubaux, Jean-Pierre},
journal={IEEE Transactions on Dependable and Secure Computing},
year={2014},
volume={11},
number={3},
pages={266-279},
doi={10.1109/TDSC.2013.57}
}
@article{van2015real,
title={Real time localization of assets in hospitals using quuppa indoor positioning technology},
author={Van der Ham, Martijn},
year={2015}
}
@article{luo2018large,
title={A large-scale location-based social network to understanding the impact of human geo-social interaction patterns on vaccination strategies in an urbanized area},
author={Luo, Wei and Gao, Peng and Cassels, Susan},
journal={Computers, environment and urban systems},
volume={72},
pages={78--87},
year={2018},
publisher={Elsevier}
}
@article{wernke2014classification,
title={A classification of location privacy attacks and approaches},
author={Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt},
journal={Personal and ubiquitous computing},
volume={18},
number={1},
pages={163--175},
year={2014},
publisher={Springer}
}