1 |
Hara, Takahiro, et al., "Dummy-based user location anonymization under real-world constraints", IEEE Access, vol.4, pp.673-687, Feb. 2016.
DOI
|
2 |
Ardagna, Claudio A., et al., "An obfuscation-based approach for protecting location privacy", IEEE Transactions on Dependable and Secure Computing, vol.8, no.1, pp.13-27, Jun. 2009.
DOI
|
3 |
Ardagna, Claudio Agostino, et al., "Location privacy protection through obfuscation-based techniques", IFIP Annual Conference on Data and Applications Security and Privacy, Springer, Berlin, Heidelberg, pp.47-60, Jul. 2007.
|
4 |
Gutscher, Andreas., "Coordinate transformation -a solution for the privacy problem of location based services?", Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, IEEE, pp.7-13, Apr. 2006.
|
5 |
Donghyeok Lee, Namje Park, "A Study on Metering Data De-identification Method for Smart Grid Privacy Protection", Journal of the Korea Institute of Information Security & Cryptology, 26(6), pp.1593-1603, Dec. 2016.
DOI
|
6 |
Namje Park, "Implementation of terminal middleware platform for mobile RFID computing", International Journal of Ad Hoc and Ubiquitous Computing, vol.8, no.4, pp.205-219, Jan. 2011.
DOI
|
7 |
Xiao, Yonghui, and Li Xiong., "Protecting locations with differential privacy under temporal correlations", Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1298-1309, Oct. 2015.
|
8 |
Jinsu Kim, Namje Park, "A Face Image Virtualization Mechanism for Privacy Intrusion Prevention in Healthcare Video Surveillance Systems", Symmetry, vol.12, no.6, pp.891, Jun. 2020. doi:10.3390/sym12060891.
DOI
|
9 |
Chen, Shu, and Hong Shen., "Semantic-aware dummy selection for location privacy preservation", 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, pp. 752-759, Aug. 2016.
|
10 |
Namje Park and Namhi Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", Journal of Sensors (Basel), vol.16, no.1, pp.1-16, Dec. 2015.
DOI
|
11 |
Jinsu Kim, Namje Park, "Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing", Personal and Ubiquitous Computing, pp. 1-9, Aug. 2019. https://doi.org/10.1007/s00779-019-01299-w.
|
12 |
Soma, Subarna Chowdhury, et al., "Trip planning queries with location privacy in spatial databases", World Wide Web, vol.20, no.2, pp.205-236, Mar. 2017.
DOI
|
13 |
Namje Park, Byung-Gyu Kim, Jinsu Kim, "A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission", Electronics, vol.8, no.7, pp.735, Jun. 2019.
DOI
|
14 |
Donghyeok Lee, Namje Park, Geonwoo Kim, Seunghun Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment", Journal of Peer-to-Peer Networking and Applications, Vol.11, No.6, pp.1299-1308, Nov. 2018.
DOI
|
15 |
Seoyeon Yoon, "Traffic data use and location information protection", Planning and Policy, 405, pp.12-17, Jul. 2015.
|
16 |
Namje Park, Marie Kim, "Implementation of load management application system using smart grid privacy policy in energy management service environment", Cluster Computing, vol.17, no.3, pp. 653-664, Sep. 2014.
DOI
|
17 |
Jinsu Kim, Namje Park, Geonwoo Kim, Seunghun Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving- Transformation in the Emerging Multimedia", Electronics, vol.8, no.4, pp.412, Apr. 2019.
DOI
|
18 |
Namje Park, Donghyeok Lee, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment", Personal and Ubiquitous Computing, vol. 22, no.1, pp.3-10, Feb. 2018.
DOI
|
19 |
Donghyeok Lee, and Namje Park, "Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance", The Journal of Supercomputing, vol.73, no.3, pp.1103-1118, Jan. 2017.
DOI
|
20 |
Chen, Pei, et al., "Preserving location and content privacy for secure ranked queries in location based services", 2016 IEEE Trustcom/BigDataSE/ISPA., IEEE, Aug. 2016.
|
21 |
Jongcheol Shin, "Direction of Privacy Policy to Revitalize the Data Industry", Planning and Policy, 451, pp.5-12, May. 2019.
|
22 |
Namje Park, Hongxin Hu, Qun Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)", International Journal of Distributed Sensor Networks, vol.2016, Jan. 2016.
|
23 |
Donghyeok Lee, Namje Park, "Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree", Multimedia Tools and Applications, pp.1-18, Mar. 2020, https://doi.org/10.1007/s11042-020-08776-y.
|
24 |
Namje Park, Hyo‐Chan Bang, "Mobile middleware platform for secure vessel traffic system in IoT service environment", Security and Communication Networks, vol.9, no.6, pp. 500-512, Apr. 2016.
DOI
|
25 |
Kido, Hidetoshi, Yutaka Yanagisawa, and Tetsuji Satoh., "An anonymous communication technique using dummies for location-based services", ICPS'05. Proceedings., pp.88-97, Jul. 2005.
|
26 |
Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment", LNCS, Advanced Web and Network Technologies and Applications, vol.3842, pp. 741-48, Jan. 2006.
|
27 |
Liu, Bo, et al., "Location privacy and its applications: A systematic study", IEEE Access, vol.6, pp.17606-17624. Apr. 2018.
DOI
|
28 |
Woo, Dae Sik, "A Study on a Rational Improvement Plan of Location Information Act for Securing Safety of the People", The Journal of Police Science, 18(2), pp.71-95, Jun. 2018.
|
29 |
Mascetti, Sergio, et al. "Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies", The VLDB Journal, vol.20, no.4, pp.541-566, Aug. 2011.
DOI
|
30 |
Chen, Pei, et al., "Preserving location and content privacy for secure ranked queries in location based services", 2016 IEEE Trustcom/BigDataSE/ISPA., pp.892-899, Aug. 2016
|
31 |
You, Tun-Hao, Wen-Chih Peng, and Wang-Chien Lee., "Protecting moving trajectories with dummies", 2007 International Conference on Mobile Data Management, IEEE, pp. 278-282., May. 2007.
|
32 |
Lei, Po-Ruey, et al., "Dummy-based schemes for protecting movement trajectories", Journal of Information Science and Engineering, vol.28, no.2, pp.335-350, Mar. 2012.
|
33 |
Do, Hyo Jin, et al., "Another dummy generation technique in location- based services", 2016 International Conference on Big Data and Smart Computing (BigComp). IEEE, pp. 532-538, Jan. 2016.
|