Protecting location privacy with personalized k-anonymity: Architecture and algorithms

B Gedik, L Liu - IEEE Transactions on Mobile Computing, 2007 - ieeexplore.ieee.org
Continued advances in mobile networks and positioning technologies have created a strong
market push for location-based applications. Examples include location-aware emergency …

[引用][C] Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

B GEDIK, L LIU - IEEE transactions on mobile computing, 2008 - pascal-francis.inist.fr
Protecting Location Privacy with Personalized k-Anonymity : Architecture and Algorithms
CNRS Inist Pascal-Francis CNRS Pascal and Francis Bibliographic Databases Simple search …

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

B Gedik, L Liu - IEEE Transactions on Mobile Computing, 2008 - dl.acm.org
Continued advances in mobile networks and positioning technologies have created a strong
market push for location-based applications. Examples include location-aware emergency …

Protecting location privacy with personalized k-anonymity: Architecture and algorithms

B Gedik, L Liu - IEEE TMC, 2008 - research.ibm.com
Continued advances in mobile networks and positioning technologies have created a strong
market push for location-based applications. Examples include location-aware emergency …

[PDF][PDF] Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

B Gedik, L Liu - Citeseer
Continued advances in mobile networks and positioning technologies have created a strong
market push for location-based applications. Examples include location-aware emergency …

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

B Gedik, L Liu - IEEE Transactions on Mobile Computing, 2008 - infona.pl
Continued advances in mobile networks and positioning technologies have created a strong
market push for location-based applications. Examples include location-aware emergency …

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

B Gedik, L Liu - IEEE Transactions on Mobile Computing, 2008 - computer.org
Continued advances in mobile networks and positioning technologies have created a strong
market push for location-based applications. Examples include location-aware emergency …

[引用][C] Protecting location privacy with personalized k-anonymity: Architecture and algorithms

B GEDIK - IEEE Trans. Mobile Computing, 2008 - cir.nii.ac.jp

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

B Gedik, L Liu - IEEE Transactions on Mobile Computing, 2008 - computer.org
Continued advances in mobile networks and positioning technologies have created a strong
market push for location-based applications. Examples include location-aware emergency …

[引用][C] Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

B Gedik, L Liu - IEEE Transactions on Mobile Computing, 2008 - cir.nii.ac.jp
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms |
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォーム …