• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,499
Next 10 →

Location Privacy

by Team Bhasya Maddukuri, Deepika Gangula, Snigdhitha Kasarla
"... Location based services today are a part of everything from control systems to smart weapons. LBS include services to identify a location of a person or object, such as discovering the nearest banking cash machine (ATM) or the whereabouts of a friend or ..."
Abstract - Add to MetaCart
Location based services today are a part of everything from control systems to smart weapons. LBS include services to identify a location of a person or object, such as discovering the nearest banking cash machine (ATM) or the whereabouts of a friend or

Quantifying Location Privacy

by Reza Shokri, George Theodorakopoulos, Jean-yves Le Boudec, Jean-pierre Hubaux - IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2011
"... It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade. Ho ..."
Abstract - Cited by 76 (18 self) - Add to MetaCart
It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) have been proposed during the last decade

Location Privacy in Wireless Networks

by Yih-chun Hu, Helen J. Wang - In ACM SIGCOMM Asia Workshop , 2005
"... Though an increasing number of wireless hotspots and mesh networks are being deployed, the problem of location privacy has been ignored. When a user’s location privacy is compromised, an attacker can determine where the user is, and use this information, for example, to stalk or blackmail the user. ..."
Abstract - Cited by 46 (5 self) - Add to MetaCart
Though an increasing number of wireless hotspots and mesh networks are being deployed, the problem of location privacy has been ignored. When a user’s location privacy is compromised, an attacker can determine where the user is, and use this information, for example, to stalk or blackmail the user

A Survey of Computational Location Privacy

by John Krumm - PERSONAL AND UBIQUITOUS COMPUTING , 2008
"... This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the ..."
Abstract - Cited by 120 (1 self) - Add to MetaCart
This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit

Location privacy in Bluetooth

by Ford-long Wong, Frank Stajano - In ESAS , 2005
"... Abstract. We discuss ways to enhance the location privacy of Bluetooth. The principal weakness of Bluetooth with respect to location privacy lies in its disclosure of a device’s permanent identifier, which makes location tracking easy. Bluetooth’s permanent identifier is often disclosed and it is al ..."
Abstract - Cited by 22 (2 self) - Add to MetaCart
Abstract. We discuss ways to enhance the location privacy of Bluetooth. The principal weakness of Bluetooth with respect to location privacy lies in its disclosure of a device’s permanent identifier, which makes location tracking easy. Bluetooth’s permanent identifier is often disclosed

Location Privacy PROBLEM STATEMENT:

by Team Bhasya Maddukuri, Deepika Gangula, Snigdhitha Kasarla
"... Location based services today are a part of everything from control systems to smart weapons. They are actively used trillions of times a day and may be one of the most heavily used application-layer decision framework in computing today. LBS include services to identify a location of a person or ob ..."
Abstract - Add to MetaCart
or object, such as discovering the nearest banking cash machine (ATM) or the whereabouts of a friend or employee. LBS include parcel tracking and vehicle tracking services. However, while people enjoy more convenient life provided by location based services, their location privacy may leak. So the problem

Caravan: Providing location privacy for vanet

by Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, Kaoru Sezaki - in Embedded Security in Cars (ESCAR , 2005
"... Abstract — In vehicular ad hoc networks (VANET), it is possible to locate and track a vehicle based on its transmissions, during communication with other vehicles or the road-side infrastructure. This type of tracking leads to threats on the location privacy of the vehicle’s user. In this paper, we ..."
Abstract - Cited by 75 (2 self) - Add to MetaCart
Abstract — In vehicular ad hoc networks (VANET), it is possible to locate and track a vehicle based on its transmissions, during communication with other vehicles or the road-side infrastructure. This type of tracking leads to threats on the location privacy of the vehicle’s user. In this paper, we

Microaggregation for database and location privacy

by Josep Domingo-ferrer - In Next Generation Information
"... Abstract. Data aggregation is a central principle underlying many applications in computer science, from artificial intelligence to data secu-rity and privacy. Microaggregation is a special clustering problem where the goal is to cluster a set of points into groups of at least k points in such a way ..."
Abstract - Cited by 7 (3 self) - Add to MetaCart
records. This paper extends the use of microaggre-gation for k-anonymity to implement the recent property of p-sensitive k-anonymity in a more unified and less disruptive way. Then location privacy is investigated: two enhanced protocols based on a trusted-third party (TTP) are proposed and thereafter

Practical Solution for Location Privacy

by In Mobile Ipv, Sugil Choi, Kwangjo Kim, Byeonggon Kim
"... Abstract. Mobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their transport-layer connectivity by using re-sources in the foreign domain network. MIP is expected to be the core infrastructure of future mobile communication, but certain level of se-curity services must be pr ..."
Abstract - Add to MetaCart
be provided before the wide deployment of MIP. Security services, such as authentication and access control, have been considered since the birth of MIP, but little attention has been given to location privacy services despite of their increased signi¯cance in wireless network. MIPv6 uses IPSec to provide

HIP location privacy framework

by Alfredo Matos, Justino Santos, Susana Sargento, Rui Aguiar, Marco Liebsch - in MobiArch ’06: Proceedings of first ACM/IEEE international workshop on Mobility in the
"... Privacy and security are key aspects in future network ar-chitectures. The Host Identity Protocol (HIP) is a new proposal which decouples identifiers from locators and may eventually replace conventional addressing and network trans-port. In this document we propose an architecture that pro-vides lo ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Privacy and security are key aspects in future network ar-chitectures. The Host Identity Protocol (HIP) is a new proposal which decouples identifiers from locators and may eventually replace conventional addressing and network trans-port. In this document we propose an architecture that pro
Next 10 →
Results 1 - 10 of 2,499
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University