Which cloak dresses you best?: comparing location cloaking methods for mobile users
Abstract
References
Index Terms
- Which cloak dresses you best?: comparing location cloaking methods for mobile users
Recommendations
Unraveling an old cloak: k-anonymity for location privacy
WPES '10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic societyThere is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential ...
Geo-indistinguishability: differential privacy for location-based systems
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityThe growing popularity of location-based systems, allowing unknown/untrusted servers to easily collect huge amounts of information regarding users' location, has recently started raising serious privacy concerns. In this paper we introduce geoind, a ...
ESOT: a new privacy model for preserving location privacy in Internet of Things
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communication, security and privacy issues arise which ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Matt Jones,
- Manfred Tscheligi,
- Program Chairs:
- Yvonne Rogers,
- Roderick Murray-Smith
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Extended-abstract
Funding Sources
- European Commission
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 126Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in