1 |
Alastair Beresford and Frank Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, Vol. 2, No. 1, 2003, pp. 46-55.
DOI
ScienceOn
|
2 |
Thomas Brinkhoff, "A framework for generating network-based moving objects," GeoInformatica, Vol. 6, No. 2, 2002, pp. 153-180.
DOI
ScienceOn
|
3 |
Dongseop Kwon, Sangjun Lee, Wonik Choi, and Sukho Lee, "An Adaptive Hashing Technique for Indexing Moving Objects," Data and Knowledge Engineering, Vol. 56, No. 3, 2006, pp. 287-303.
DOI
ScienceOn
|
4 |
Dongseop Kwon, Sangjun Lee, and Sukho Lee, "Efficient Update Method for Indexing Locations of Moving Objects," Journal of Information Science and Engineering, Vol. 21, No. 3, 2005, pp. 643-658.
|
5 |
Dongseop Kwon, Sangjun Lee, and Sukho Lee, "Indexing the Current Positions of Moving Objects Using the Lazy Update R-tree," Proceedings of the 3rd International Conference on Mobile Data Management(MDM2002), 2002, pp. 113-120.
|
6 |
Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian, "t-closeness : Privacy Beyond k-Anonymity and l-Diversity," Proceedings of the IEEE 23rd International Conference on Data Engineering, 2007, pp. 106-115.
|
7 |
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam, "l-Diversity : Privacy Beyond k-Anonymity," ACM Transactions on Knowledge Discovery from Data(TKDD), Vol. 1, No. 1, 2007.
|
8 |
Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref, "The new Casper :query processing for location services without compromising privacy," Proceedings of the 32nd international conference on Very large data bases, 2006, pp. 763-774.
|
9 |
Mohamed F. Mokbel, Thanaa M. Ghanem, Walid G. Aref, "Spatio-temporal Access Methods", IEEE Data Engineering Bulletin, Vol. 26, No. 2, 2003, pp. 40-49.
|
10 |
Bill Schilit, Jason Hong, and Marco Gruteser, "Wireless location privacy protection," IEEE Computer, Vol. 36, No. 12, 2003, pp. 135-137.
DOI
ScienceOn
|
11 |
Marco Gruteser and Dirk Grunwald, "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," Proceedings of the 1st international conference on Mobile systems, applications and services, 2003, pp. 31-42.
|
12 |
Chi-Yin Chow, Mohamed F. Mokbel, Walid G. Aref, and West Lafayette, "Casper : Query processing for location services without compromising privacy," ACM Transactions on Database Systems(TODS), Vol. 34, No. 4, 2009, pp. 1-48.
|
13 |
Wonik Choi, Dongseop Kwon, and Sangjun Lee, "Spatio-Temporal Data Warehouses Using An Adaptive Cell- based Approach," Data and Knowledge Engineering, Vol. 59, No. 7, 2006, pp. 189-207.
DOI
|
14 |
Bugra Gedik, Ling Liu, "Location Privacy in Mobile Systems : A Personalized Anonymization Model," Proceedings of the 25th International Conference on Distributed Computing Systems, 2005, pp. 620-629.
|
15 |
Jay Warrior, Eric Mchenry, and Kenneth Mcgee, "They Know Who You Are," IEEE Spectrum Vol. 40, No. 7, 2003, pp. 20-25.
DOI
ScienceOn
|
16 |
Latanya Sweeney, "k-anonymity : a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, 2002, pp. 557-570.
DOI
ScienceOn
|