Skip to main content
Department of Information Technology
  • Hiding Stars with Fireworks: Location Privacy through Camouflage
  • Unraveling an Old Cloak: k-anonymity for Location Privacy
  • A Unified Framework for Location Privacy
  • SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
  • Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
  • A Customizable k-Anonymity Model for Protecting Location Privacy
  • Achieving k-anonymity Privacy Protection Using Generalization and Suppression
  • k-anonymity: A Model for Protecting Privacy
  • The Privacy Implications of Personal Locators: Why You Should Think Twice Before Voluntarily Availing Yourself to GPS Monitoring
  • Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis
  • Mix Zones: User Privacy in Location-aware Services
  • A Formal Model of Obfuscation and Negotiation for Location Privacy
  • Preserving User Location Privacy in Mobile Data Management Infrastructures
  • A Survey of Computational Location Privacy
  • A Study on The Value of Location Privacy
  • Privacy Issues in Location-Aware Mobile Devices
  • Protection of Location Privacy using Dummies for Location-based Services
  • Protecting Location Privacy Through Path Confusion
  • Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking
  • A Distributed k-Anonymity Protocol for Location Privacy
  • Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
  • Concepts for Personal Location Privacy Policies
  • Location Privacy Protection Through Obfuscation-based Techniques
  • Preserving Location Privacy in Wireless LANs
  • Survey on Location Privacy in Pervasive Computing
  • AMOEBA: Robust Location Privacy Scheme for VANET
  • Handicapping attacker's confidence: an alternative to k-anonymization
Updated  2011-08-24 12:52:48 by Volkan Cambazoglu.