Results 1 - 10
of
2,499
Location Privacy
"... Location based services today are a part of everything from control systems to smart weapons. LBS include services to identify a location of a person or object, such as discovering the nearest banking cash machine (ATM) or the whereabouts of a friend or ..."
Abstract
- Add to MetaCart
Location based services today are a part of everything from control systems to smart weapons. LBS include services to identify a location of a person or object, such as discovering the nearest banking cash machine (ATM) or the whereabouts of a friend or
Quantifying Location Privacy
- IEEE SYMPOSIUM ON SECURITY AND PRIVACY
, 2011
"... It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade. Ho ..."
Abstract
-
Cited by 76 (18 self)
- Add to MetaCart
It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade
Location Privacy in Wireless Networks
- In ACM SIGCOMM Asia Workshop
, 2005
"... Though an increasing number of wireless hotspots and mesh networks are being deployed, the problem of location privacy has been ignored. When a user’s location privacy is compromised, an attacker can determine where the user is, and use this information, for example, to stalk or blackmail the user. ..."
Abstract
-
Cited by 46 (5 self)
- Add to MetaCart
Though an increasing number of wireless hotspots and mesh networks are being deployed, the problem of location privacy has been ignored. When a user’s location privacy is compromised, an attacker can determine where the user is, and use this information, for example, to stalk or blackmail the user
A Survey of Computational Location Privacy
- PERSONAL AND UBIQUITOUS COMPUTING
, 2008
"... This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the ..."
Abstract
-
Cited by 120 (1 self)
- Add to MetaCart
This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit
Location privacy in Bluetooth
- In ESAS
, 2005
"... Abstract. We discuss ways to enhance the location privacy of Bluetooth. The principal weakness of Bluetooth with respect to location privacy lies in its disclosure of a device’s permanent identifier, which makes location tracking easy. Bluetooth’s permanent identifier is often disclosed and it is al ..."
Abstract
-
Cited by 22 (2 self)
- Add to MetaCart
Abstract. We discuss ways to enhance the location privacy of Bluetooth. The principal weakness of Bluetooth with respect to location privacy lies in its disclosure of a device’s permanent identifier, which makes location tracking easy. Bluetooth’s permanent identifier is often disclosed
Location Privacy PROBLEM STATEMENT:
"... Location based services today are a part of everything from control systems to smart weapons. They are actively used trillions of times a day and may be one of the most heavily used application-layer decision framework in computing today. LBS include services to identify a location of a person or ob ..."
Abstract
- Add to MetaCart
or object, such as discovering the nearest banking cash machine (ATM) or the whereabouts of a friend or employee. LBS include parcel tracking and vehicle tracking services. However, while people enjoy more convenient life provided by location based services, their location privacy may leak. So the problem
Caravan: Providing location privacy for vanet
- in Embedded Security in Cars (ESCAR
, 2005
"... Abstract — In vehicular ad hoc networks (VANET), it is possible to locate and track a vehicle based on its transmissions, during communication with other vehicles or the road-side infrastructure. This type of tracking leads to threats on the location privacy of the vehicle’s user. In this paper, we ..."
Abstract
-
Cited by 75 (2 self)
- Add to MetaCart
Abstract — In vehicular ad hoc networks (VANET), it is possible to locate and track a vehicle based on its transmissions, during communication with other vehicles or the road-side infrastructure. This type of tracking leads to threats on the location privacy of the vehicle’s user. In this paper, we
Microaggregation for database and location privacy
- In Next Generation Information
"... Abstract. Data aggregation is a central principle underlying many applications in computer science, from artificial intelligence to data secu-rity and privacy. Microaggregation is a special clustering problem where the goal is to cluster a set of points into groups of at least k points in such a way ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
records. This paper extends the use of microaggre-gation for k-anonymity to implement the recent property of p-sensitive k-anonymity in a more unified and less disruptive way. Then location privacy is investigated: two enhanced protocols based on a trusted-third party (TTP) are proposed and thereafter
Practical Solution for Location Privacy
"... Abstract. Mobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their transport-layer connectivity by using re-sources in the foreign domain network. MIP is expected to be the core infrastructure of future mobile communication, but certain level of se-curity services must be pr ..."
Abstract
- Add to MetaCart
be provided before the wide deployment of MIP. Security services, such as authentication and access control, have been considered since the birth of MIP, but little attention has been given to location privacy services despite of their increased signi¯cance in wireless network. MIPv6 uses IPSec to provide
HIP location privacy framework
- in MobiArch ’06: Proceedings of first ACM/IEEE international workshop on Mobility in the
"... Privacy and security are key aspects in future network ar-chitectures. The Host Identity Protocol (HIP) is a new proposal which decouples identifiers from locators and may eventually replace conventional addressing and network trans-port. In this document we propose an architecture that pro-vides lo ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Privacy and security are key aspects in future network ar-chitectures. The Host Identity Protocol (HIP) is a new proposal which decouples identifiers from locators and may eventually replace conventional addressing and network trans-port. In this document we propose an architecture that pro
Results 1 - 10
of
2,499