Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] B. Hoh and M. Gruteser, “Protecting location privacythrough path confusion,” in Proc. 1st Int. Conf. SecureComm, 2005,pp. 194–205. [2] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan,“Private queries in location based services: Anonymizers are not necessary,” inProc. ACM SIGMOD, Vancouver, BC, Canada, 2008, pp. 121–132. [3] B. Gedik and L. Liu, “Location privacy in mobile systems: A per-sonalized anonymization model,” inProc. ICDCS, Columbus, OH, USA, 2005, pp. 620–629. [4] C. Gentry and Z. Ramzan, “Single-database private informa-tion retrieval with constant communication rate,” inProc. ICALP,L. Caires, G. Italiano, L. Monteiro, C. Palamidessi, and M. Yung,Eds., Lisbon, Portugal, 2005, pp. 803–815, LNCS 3580. [5] G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “A hybrid technique for private location-based queries with database pro-tection,” in Proc. Adv. Spatial Temporal Databases, N. Mamoulis, T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg, Denmark, 2009, pp. 98– 116, LNCS 5644. [6] G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino,“Approximate and exact hybrid algorithms for private nearest-neighbor queries with database [7] B. Schilit, J. Hong, and M. Gruteser, “Wireless location privacy protection,”Computer, vol. 36, no. 12, pp. 135–137, 2003. [8] F. Grace, “Stalker Victims Should Check For GPS,” Feb. 2003,www.cbsnews.com. [9] DailyNews, “How cell phone helped cops nail key murder suspect secret ’pings’ that gave bouncer away,” Mar. 2006. [10] “Police: Thieves robbed homes based on facebook,social media sites,” WMUR News, September 010,http://www.wmur.com/r/24943582/detail.html. [11] M. Gruteser and D. Grunwald, “Anonymous usage of location-based service through spatial and temporal cloaking,” in Proc. of Mobisys, 2003
![]() | V2I904.pdf |