Scalable and privacy-respectful interactive discovery of place semantics from human mobility traces

N Andrienko, G Andrienko, G Fuchs… - Information …, 2016 - journals.sagepub.com
Mobility diaries of a large number of people are needed for assessing transportation
infrastructure and spatial development planning. Acquisition of personal mobility diaries …

In-network trajectory privacy preservation

M Guo, X Jin, N Pissinou, S Zanlongo… - ACM Computing …, 2015 - dl.acm.org
Recent advances in mobile device, wireless networking, and positional technologies have
helped location-aware applications become pervasive. However, location trajectory privacy …

Innercircle: A parallelizable decentralized privacy-preserving location proximity protocol

P Hallgren, M Ochoa, A Sabelfeld - 2015 13th Annual …, 2015 - ieeexplore.ieee.org
Location Based Services (LBS) are becoming increasingly popular. Users enjoy a wide
range of services from tracking a lost phone to querying for nearby restaurants or nearby …

Protecting the Moving User's Locations by Combining Differential Privacy and k‐Anonymity under Temporal Correlations in Wireless Networks

W Zhang, G Yin, Y Sha, J Yang - … Communications and Mobile …, 2021 - Wiley Online Library
The rapid development of the Global Positioning System (GPS) devices and location‐based
services (LBSs) facilitates the collection of huge amounts of personal information for the …

Where are you bob? privacy-preserving proximity testing with a napping party

I Oleynikov, E Pagnin, A Sabelfeld - … 14–18, 2020, Proceedings, Part I 25, 2020 - Springer
Location based services (LBS) extensively utilize proximity testing to help people discover
nearby friends, devices, and services. Current practices rely on full trust to the service …

What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of …

RC Staudemeyer, HC Pöhls, M Wójcik - Journal of Reliable Intelligent …, 2019 - Springer
Privacy requires more than just encryption of data before and during transmission. Privacy
would actually demand hiding the sheer fact that communication takes place. This requires …

Maxpace: Speed-constrained location queries

P Hallgren, M Ochoa, A Sabelfeld - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
With the increasing proliferation of mobile devices, location-based services enjoy increasing
popularity. At the same time, this raises concerns regarding location privacy, as seen in …

[图书][B] Location privacy in wireless sensor networks

R Rios, J Lopez, J Cuellar - 2016 - taylorfrancis.com
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an
unprecedented privacy risk given their ability to collect information on quantities and …

Constrained proximity attacks on mobile targets

X Wang, X Hou, R Rios, NO Tippenhauer… - ACM Transactions on …, 2022 - dl.acm.org
Proximity attacks allow an adversary to uncover the location of a victim by repeatedly issuing
queries with fake location data. These attacks have been mostly studied in scenarios where …

Location proximity attacks against mobile targets: Analytical bounds and attacker strategies

X Wang, X Hou, R Rios, P Hallgren… - Computer Security: 23rd …, 2018 - Springer
Location privacy has mostly focused on scenarios where users remain static. However,
investigating scenarios where the victims present a particular mobility pattern is more …