Spatial crowdsourcing uses devices that has GPS (global positioning system) and collects information. Data retrieved includes location data that can be used to analyze maps and local spatial characteristics. In recent years, researchers have been making a connection between social aspects and technological aspects regarding location information. For example, if co-location information is considered as the data which potential attackers would get and take into consideration, the location privacy is decreased by more than 60%. Also, by a constant report of a user's location information, a movement profile could be constructed for this specific user based on statistical analysis, and a large amount of information could be exploited and generated from this profile such as user's office location, medical records, financial status, and political views. Therefore, more and more researchers have taken account of the social influence in their algorithms, since this socially networked information is accessible to the public and might be used by potential attackers.
In order to meet user's requirements for location privacy in the process of data transportation, researchers have been exploring and investigating models to address the disclosure of private information.
The secure-multi-party model is constructed based on the idea of sharing accurate information among n parties. Each party has access to a particular segment of the precise information and at the same time being prevented from acquiring the other shares of the data. However, the computation problem is introduced in the process, since a large amount of data processing is required to satisfy the requirement.
The minimal information sharing model is introduced to use cryptographic techniques to perform join and intersection operations. However, the inflexibility of this model to fit into other queries makes it hard to be satisfying to most practical applications.
The most popular model right now is the trusted third-party model. Some of the practical applications have already adopted the idea of a trusted third party into their services to preserve privacy. For example, Anonymizer is integrated into various websites, which could give anonymous surfing service to its users. Also, when purchasing through PayPal, users are not required to provide their credit card information. Therefore, by introducing a trusted-third-party, users’ private information is not directly exposed to the service providers.
The promising approach of preserving location privacy is to report data on users' behavior and at the same time protect identity and location privacy. Several methods have been investigated to enhance the performances of location-preserving techniques, such as location perturbation and the report of landmark objects.
The idea of location perturbation is to replace the exact location information with a coarser grained spatial range, and thus uncertainty would be introduced when the adversaries try to match the user to either a known location identity or external observation of location identity. Location perturbation is usually satisfied by using spatial cloaking, temporal cloaking, or location obfuscation. Spatial and temporal cloaking refers to the wrong or imprecise location and time reported to the service providers, instead of the exact information. For example, location privacy could be enhanced by increasing the time between location reports, since higher report frequencies makes reidentification more possible to happen through data mining. There are other cases when the report of location information is delayed until the visit of K users is identified in that region.
However, this approach could affect the service reported by the service providers since the data they received are not accurate. The accuracy and timelessness issues are usually discussed in this approach. Also, some attacks have been recognized based on the idea of cloaking and break user privacy.
In order to avoid location tracking, usually less or no location information would be reported to the service provider. For example, when requesting weather, a zip code instead of a tracked location would be accurate enough for the quality of the service received.
A centralized scheme is constructed based on a central location anonymizer (anonymizing server) and is considered as an intermediate between the user and the service provider. Generally, the responsibilities of a location anonymizer include tracking users' exact location, blurring user specific location information into cloaked areas and communicate with the service provider. For example, one of the methods to achieve this is by replacing the correct network addresses with fake-IDs before the information are forward to the service provider. Sometimes user identity is hidden, while still allowing the service provider to authenticate the user and possibly charge the user for the service. These steps are usually achieved through spatial cloaking or path confusion. Except in some cases where the correct location information are sent for high service quality, the exact location information or temporal information are usually modified to preserve user privacy.
Serving as an intermediate between the user and location-based server, location anonymizer generally conducts the following activities:
The location anonymizer could also be considered as a trusted-third party since it is trusted by the user with the accurate location information and private profile stored in the location anonymizer. However, this could also expose users’ privacy into great risks at the same time. First, since the anonymizer keeps tracking users' information and has access to the users’ exact location and profile information, it is usually the target of most attackers and thus under higher risks Second, the extent to which users trust the location anonymizers could be essential. If a fully trusted third party is integrated into the algorithm, user location information would be reported continuously to the location anonymizer, which may cause privacy issues if the anonymizer is compromised. Third, the location anonymizer may lead to a performance bottleneck when a large number of requests are presented and required to be cloaked. This is because the location anonymizer is responsible for maintaining the number of users in a region in order to provide an acceptable level of service quality.
In a distributed environment, users anonymize their location information through fixed communication infrastructures, such as base stations. Usually, a certification server is introduced in a distributed scheme where users are registered. Before participating in this system, users are required to obtain a certificate which means that they are trusted. Therefore, every time after user request a location-based service and before the exact location information is forward to the server, the auxiliary users registered in this system collaborate to hide the precise location of the user. The number of assistant users involved in cloaking this region is based on K-anonymity, which is usually set be the specific user. In the cases where there are not enough users nearby, S-proximity is generally adopted to generate a high number of paired user identities and location information for the actual user to be indistinguishable in the specific area. The other profiles and location information sent to the service provider are sometimes also referred to as dummies.
However, the complexity of the data structure which is used to anonymize the location could result in difficulties when applying this mechanism to highly dynamic location-based mobile applications. Also, the issue of large computation and communication is posed to the environment.
Researchers have been discussing some privacy requirements and security requirements which would make the privacy-preserving techniques appropriate for the peer-to-peer environment. For example, authentication and authorization are required to secure and identify the user and thus making authorized users distinguishable from unauthorized users. Confidentiality and integrity make sure that only those who are authorized have access to the data transmitted between peers, and the transmitted information cannot be modified.
Some of the drawbacks identified in a peer-to-peer environment are the communication costs, not enough users and threats of potential malicious users hiding in the community.
No matter what the specific privacy-preserving solution is integrated to cloak a particular region in which the service requester stays. It is usually constructed from several angles to satisfy different privacy requirements better. These standards are either adjusted by the users or are decided by the application designers. Some of the privacy parameters include K-anonymity, entropy, minimum area, and maximum area.
Some approaches have also been discussed to introduce more ambiguity to the system, such as historical K-anonymity, p-sensitivity, and l-diversity. The idea of historical K-anonymity is proposed to guarantee the moving objects by making sure that there are at least
k
−
1
{\displaystyle k-1}
users who share the same historical requests, which requires the anonymizer to track not only the current movement of the user but also the sequence location of the user. Therefore, even user's historical location points are disclosed, the adversaries could not distinguish the specific user from a group of potential users. P-sensitivity is used to ensure that the critical attributes such as the identity information have at least
p
{\displaystyle p}
different values within
k
{\displaystyle k}
users. Moreover, l-diversity aims to guarantee the user is unidentifiable from l different physical locations.
However, setting a large K value would also requires additional spatial and temporal cloaking which leads to a low resolution of information, which in turn could lead to degraded quality of service.
Minimum area size refers to the smallest region expanded from the exact location point which satisfies the specific privacy requirements. Usually, the higher the privacy requirements, the bigger the area is required to increase the complicity of distinguishing the exact location of users. Also, the idea of minimum area is particularly important in dense areas when K-anonymity might not be efficient to provide the guaranteed privacy-preserving performance. For example, if the requestor is in a shopping mall which has a promising discount, there might be a lot of people around him or her, and thus this could be considered a very dense environment. Under such a situation, a large K-anonymity such as L=100 would only correspond to a small region, since it does not require a large area to include 100 people near the user. This might result in an inefficient cloaked area since the space where the user could potentially reside is smaller compared with the situation of the same level of K-anonymity, yet people are more scattered from each other.
The cloaked region generated by the method of spatial cloaking could fit into multiple environments, such as snapshot location, continuous location, spatial networks, and wireless sensor networks. Sometimes, the algorithms which generate a cloaked area are designed to fit into various frameworks without changing the original coordinate. In fact, with the specification of the algorithms and well-establishment of most generally adopted mechanisms, more privacy-preserving techniques are designed specifically for the desired environment to fit into different privacy requirements better.
Despite the privacy requirements such as K-anonymity, maximum area size, and minimum area size, there are other requirements regarding the privacy preserved in geosocial applications. For example, location and user unlinkability require that the service provider should not be able to identify the user who conducts the same request twice or the correspondence between a given cloaked area and its real-time location. Also, the location data privacy requires that the service provider should not have access to the content of data in a specific location. For example, LoX is mainly designed to satisfy these privacy requirements of geosocial applications.
With the advancement of global positioning systems and the development of wireless communication which are introduced in the extensive use of location-based applications, high risks have been placed on user privacy. Both the service providers and users are under the dangers of being attacked and information being abused. It has been reported that some GPS devices have been used to exploit personal information and stalk personal locations. Sometimes, only reporting location information would already indicate much private information. One of the attacks specific to location-based services is the space or time correlated inference attacks, in which the visited location is correlated with the particular time, and this could lead to the disclosure of private life and private business.
Continuous location-based services require a constant report of location information to the service providers. During the process of requesting a continuous location-based service, pressure has been recognized on privacy leakage issues. Since the a series of cloaked areas are reported, with the advancing technological performances, a correlation could be generated between the blurred regions. Therefore, many types of research have been conducted addressing the location privacy issues in continuous location-based services.
While snapshot location generally refers to the linear relation between the specific location point and a point in the temporal coordinate.
Some mechanisms have been proposed to either address the privacy-preserving issues in both of the two environments simultaneously or concentrate on fulfilling each privacy requirement respectively. For example, a privacy grid called a dynamic grid system is proposed to fit into both snapshot and continuous location-based service environments.
The existing privacy solutions generally fall into two categories: data privacy and context privacy. Besides addressing the issues in location privacy, these mechanisms might be applied to other scenarios. For example, tools such as cryptography, anonymity, obfuscation and caching have been proposed, discussed, and tested to better preserve user privacy. These mechanisms usually try to solve location privacy issues from different angles and thus fit into different situations.
Even though the effectiveness of spatial cloaking has been widely accepted and the idea of spatial cloaking has been integrated into multiple designs, there are still some concerns towards it. First, the two schemes of spatial cloaking both have their limitations. For example, in the centralized scheme, although users' other private information including identity has been cloaked, the location itself would be able to release sensitive information, especially when a specific user requests service for multiple times with the same pseudonym. In a decentralized scheme, there are issues with large computation and not enough peers in a region.
Second, the ability of attackers requires a more in-depth consideration and investigation according to the advancement of technology such as machine learning and its connection with social relations, particularly the share of information online.
Third, the credibility of a trusted-third-party has also been identified as one of the issues. There is a large number of software published on app markets every day, and some of them have not undergone a strict examination. Software bugs, configuration errors at the trusted-third-party and malicious administrators could expose private user data under high risks. Based on a study from 2010, two-thirds of all the trusted-third-party applications in the Android market are considered to be suspicious towards sensitive information.
Fourth, location privacy has been recognized as a personalized requirement and is sensitive to various contexts. Customizing privacy parameters has been exploring in recent years since different people have different expectations on the amount of privacy preserved and sometimes the default settings do not fully satisfy user needs. Considering that there is often a trade-off relation between privacy and personalization and personalization usually leads to better service, people would have different preferences. In the situations where users can change the default configurations, accepting the default instead of customizing seems to be a more popular choice. Also, people's attitudes towards disclosing their location information could vary based on the service's usefulness, privacy safeguards, and the disclosed quantity etc. In most situations, people are weighing the price of privacy sharing and the benefits they received.
Fifth, there are many protection mechanism proposed in literature yet few of them have been practically integrated into commercial applications. Since there is little analysis regarding the implementation of location privacy-preserving mechanisms, there is still a large gap between theory and privacy.
During the process of exchanging data, the three main parties—the user, the server, and the networks—can be attacked by adversaries. The knowledge held by adversaries which could be used to carry out location attacks includes observed location information, precise location information, and context knowledge. The techniques of machine learning and big data have also led to an emerging trend in location privacy, and the popularity of smart devices has led to an increasing number of attacks. Some of the adopted approaches include the virus, the Trojan applications, and several cyber-attacks.
Cross-servicing attacks usually take place when users are using poorly protected wireless connectivity, especially in public places.
Video-based attacks are more prevalent in mobile devices usually due to the use of Bluetooth, camera, and video capacities, since there are malicious software applications secretly recording users’ behavior data and reporting that information to a remote device. Stealthy Video Capture is one of the intentionally designed applications which spies an unconscious user and further report the information.
Sensor sniffing attacks usually refer to the cases where intentionally designed applications are installed on a device. Under this situation, even adversaries do not have physical contact with the mobile device, users’ personal information would still under risks of being disclosed.
In a localization attack, contextual knowledge is combined with observed location information to disclose a precise location. The contextual knowledge can also be combined with precise location information to carry out identity attacks.
Integrating learning algorithms and other deep learning methods are posing a huge challenge to location privacy, along with the massive amount of data online. For example, current deep learning methods can come up with predictions about geolocations based on the personal photos from social networks and performs types of object detection based on their abilities to analyze millions of photos and videos.
Policy approaches have also been discussed in recent years which intend to revise relevant guidelines or propose new regulations to better manage location-based service applications. The current technology state does not have a sufficiently aligned policies and legal environment, and there are efforts from both academia and industry trying to address this issue. Two uniformly accepted and well- established requirements are the users' awareness of location privacy policies in a specific service and their consents of sending their personal location to a service provider. Besides these two approaches, researchers have also been focusing on guarding the app markets, since an insecure app market would expose unaware users to several privacy risks. For example, there have been identified much malware in the Android app market, which are designed to carry cyber attacks on Android devices. Without effective and clear guidelines to regulate location information, it would generate both ethical and lawful problems. Therefore, many guidelines have been discussed in years recently, to monitor the use of location information.
European data protection guideline was recently revised to include and specify the privacy of an individual's data and personally identifiable information (PIIs). These adjustments intend to make a safe yet effective service environment. Specifically, location privacy is enhanced by making sure that the users are fully aware and consented on the location information which would be sent to the service providers. Another important adjustment is that a complete responsibility would be given to the service providers when users’ private information is being processed.
The electronic communications privacy act discusses the legal framework of privacy protection and gives standards of law enforcement access to electronic records and communications. It is also very influential in deciding electronic surveillance issues.
Even though many privacy preserving mechanisms have not been integrated into common use due to effectiveness, efficiency, and practicality, some location-based service providers have started to address privacy issues in their applications. For example, Twitter enables its users to customize location accuracy. Locations posted in Glympse will automatically expire. Also, SocialRadar allows its users to choose to be anonymous or invisible when using this application.
In this case, the police used a beeper to keep track of the suspect's vehicle. After using the beeper alone to track the suspect, the officers secured a search warrant and confirmed that the suspect was producing illicit drugs in the van. The suspect tried to suppress the evidence based on the tracking device used during the monitoring process, but the court denied this. The court concluded that “A person traveling in an automobile on a public thouroughfare [sic] has no reasonable expectation of privacy in his movement from one place to another.” Nevertheless, the court reserved the discussion of whether twenty-four-hour surveillance would constitute a search.
Chow, Chi-Yin; Mokbel, Mohamed F.; Liu, Xuan (2011-04-01). "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments". GeoInformatica. 15 (2): 351–380. Bibcode:2011GInfo..15..351C. doi:10.1007/s10707-009-0099-y. S2CID 17630799. /wiki/Bibcode_(identifier)
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Chow, Chi-Yin; Mokbel, Mohamed F.; Liu, Xuan (2011-04-01). "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments". GeoInformatica. 15 (2): 351–380. Bibcode:2011GInfo..15..351C. doi:10.1007/s10707-009-0099-y. S2CID 17630799. /wiki/Bibcode_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Almuhimedi, Hazim; Schaub, Florian; Sadeh, Norman; Adjerid, Idris; Acquisti, Alessandro; Gluck, Joshua; Cranor, Lorrie Faith; Agarwal, Yuvraj (2015). "Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging". Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. CHI '15. New York, NY, USA: ACM. pp. 787–796. doi:10.1145/2702123.2702210. ISBN 978-1-4503-3145-6. S2CID 10628066. 978-1-4503-3145-6
Puttaswamy, K. P. N.; Wang, S.; Steinbauer, T.; Agrawal, D.; Abbadi, A. E.; Kruegel, C.; Zhao, B. Y. (Jan 2014). "Preserving Location Privacy in Geosocial Applications". IEEE Transactions on Mobile Computing. 13 (1): 159–173. doi:10.1109/TMC.2012.247. S2CID 9831503. Archived from the original on 2020-06-26. Retrieved 2019-12-01. https://escholarship.org/uc/item/55d6c8x2
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Li, Yan; Shin, Byeong-Seok (2017-12-10). "Task-Management Method Using R-Tree Spatial Cloaking for Large-Scale Crowdsourcing". Symmetry. 9 (12): 311. Bibcode:2017Symm....9..311L. doi:10.3390/sym9120311. ISSN 2073-8994. https://doi.org/10.3390%2Fsym9120311
Li, Yan; Shin, Byeong-Seok (2017-12-10). "Task-Management Method Using R-Tree Spatial Cloaking for Large-Scale Crowdsourcing". Symmetry. 9 (12): 311. Bibcode:2017Symm....9..311L. doi:10.3390/sym9120311. ISSN 2073-8994. https://doi.org/10.3390%2Fsym9120311
Olteanu, Alexandra-Mihaela; Huguenin, Kevin; Shokri, Reza; Humbert, Mathias; Hubaux, Jean-Pierre (1 March 2017). "Quantifying Interdependent Privacy Risks with Location Data" (PDF). IEEE Transactions on Mobile Computing. 16 (3): 829–842. doi:10.1109/TMC.2016.2561281. S2CID 206745816. Archived (PDF) from the original on 25 July 2018. Retrieved 28 April 2019. https://hal.archives-ouvertes.fr/hal-01266229/file/Olteanu2016TMC.pdf
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Du, Wenliang; Atallah, Mikhail J. (2001). "Secure multi-party computation problems and their applications". Proceedings of the 2001 workshop on New security paradigms - NSPW '01. p. 13. doi:10.1145/508171.508174. ISBN 978-1-58113-457-5. S2CID 5505223. 978-1-58113-457-5
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Puttaswamy, K. P. N.; Wang, S.; Steinbauer, T.; Agrawal, D.; Abbadi, A. E.; Kruegel, C.; Zhao, B. Y. (Jan 2014). "Preserving Location Privacy in Geosocial Applications". IEEE Transactions on Mobile Computing. 13 (1): 159–173. doi:10.1109/TMC.2012.247. S2CID 9831503. Archived from the original on 2020-06-26. Retrieved 2019-12-01. https://escholarship.org/uc/item/55d6c8x2
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Hoh, Baik; Gruteser, M.; Xiong, Hui; Alrabady, A. (October 2006). "Enhancing Security and Privacy in Traffic-Monitoring Systems". IEEE Pervasive Computing. 5 (4): 38–46. doi:10.1109/MPRV.2006.69. S2CID 518882. /wiki/Doi_(identifier)
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Puttaswamy, K. P. N.; Wang, S.; Steinbauer, T.; Agrawal, D.; Abbadi, A. E.; Kruegel, C.; Zhao, B. Y. (Jan 2014). "Preserving Location Privacy in Geosocial Applications". IEEE Transactions on Mobile Computing. 13 (1): 159–173. doi:10.1109/TMC.2012.247. S2CID 9831503. Archived from the original on 2020-06-26. Retrieved 2019-12-01. https://escholarship.org/uc/item/55d6c8x2
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Zhangwei, H.; Mingjun, X. (April 2010). "A Distributed Spatial Cloaking Protocol for Location Privacy". 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2. S2CID 23473560. 978-1-4244-6597-2
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Liu, Xuan (2011-04-01). "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments". GeoInformatica. 15 (2): 351–380. Bibcode:2011GInfo..15..351C. doi:10.1007/s10707-009-0099-y. S2CID 17630799. /wiki/Bibcode_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Zhangwei, H.; Mingjun, X. (April 2010). "A Distributed Spatial Cloaking Protocol for Location Privacy". 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2. S2CID 23473560. 978-1-4244-6597-2
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Zhangwei, H.; Mingjun, X. (April 2010). "A Distributed Spatial Cloaking Protocol for Location Privacy". 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2. S2CID 23473560. 978-1-4244-6597-2
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Ghinita, Gabriel; Kalnis, Panos; Skiadopoulos, Spiros (2007). "PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems". Proceedings of the 16th International Conference on World Wide Web. WWW '07. New York, NY, USA: ACM. pp. 371–380. doi:10.1145/1242572.1242623. ISBN 978-1-59593-654-7. S2CID 1868205. 978-1-59593-654-7
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Ghinita, Gabriel; Kalnis, Panos; Skiadopoulos, Spiros (2007). "PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems". Proceedings of the 16th International Conference on World Wide Web. WWW '07. New York, NY, USA: ACM. pp. 371–380. doi:10.1145/1242572.1242623. ISBN 978-1-59593-654-7. S2CID 1868205. 978-1-59593-654-7
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Liu, Xuan (2011-04-01). "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments". GeoInformatica. 15 (2): 351–380. Bibcode:2011GInfo..15..351C. doi:10.1007/s10707-009-0099-y. S2CID 17630799. /wiki/Bibcode_(identifier)
Haus, Michael; Waqas, Muhammad; Ding, Aaron Yi; Li, Yong; Tarkoma, Sasu; Ott, Jorg (2017). "Security and Privacy in Device-to-Device (D2D) Communication: A Review". IEEE Communications Surveys & Tutorials. 19 (2): 1054–1079. doi:10.1109/COMST.2017.2649687. S2CID 21563297. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Liu, Xuan (2011-04-01). "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments". GeoInformatica. 15 (2): 351–380. Bibcode:2011GInfo..15..351C. doi:10.1007/s10707-009-0099-y. S2CID 17630799. /wiki/Bibcode_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Haus, Michael; Waqas, Muhammad; Ding, Aaron Yi; Li, Yong; Tarkoma, Sasu; Ott, Jorg (2017). "Security and Privacy in Device-to-Device (D2D) Communication: A Review". IEEE Communications Surveys & Tutorials. 19 (2): 1054–1079. doi:10.1109/COMST.2017.2649687. S2CID 21563297. /wiki/Doi_(identifier)
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Zhangwei, H.; Mingjun, X. (April 2010). "A Distributed Spatial Cloaking Protocol for Location Privacy". 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2. S2CID 23473560. 978-1-4244-6597-2
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Sweeney, Latanya (October 2002). "k-anonymity: A model for protecting privacy". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 10 (5): 557–570. doi:10.1142/S0218488502001648. /wiki/Doi_(identifier)
Samarati, Pierangela; Sweeney, Latanya (1998). "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression". CiteSeerX 10.1.1.37.5829. Archived from the original on 2022-01-25. Retrieved 2019-04-28. {{cite journal}}: Cite journal requires |journal= (help) http://www.csl.sri.com/papers/sritr-98-04/
Samarati, P. (2001). "Protecting respondents identities in microdata release". IEEE Transactions on Knowledge and Data Engineering. 13 (6): 1010–1027. doi:10.1109/69.971193. S2CID 561716. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Solanas, Agusti; Sebé, Francesc; Domingo-Ferrer, Josep (2008). "Micro-aggregation-based Heuristics for P-sensitive K-anonymity: One Step Beyond". Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society. PAIS '08. New York, NY, USA: ACM. pp. 61–69. doi:10.1145/1379287.1379300. ISBN 978-1-59593-965-4. S2CID 9052342. 978-1-59593-965-4
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Machanavajjhala, A.; Gehrke, J.; Kifer, D.; Venkitasubramaniam, M. (April 2006). "L-diversity: privacy beyond k-anonymity". 22nd International Conference on Data Engineering (ICDE'06). pp. 22–24. doi:10.1109/ICDE.2006.1. ISBN 978-0-7695-2570-9. 978-0-7695-2570-9
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Puttaswamy, K. P. N.; Wang, S.; Steinbauer, T.; Agrawal, D.; Abbadi, A. E.; Kruegel, C.; Zhao, B. Y. (Jan 2014). "Preserving Location Privacy in Geosocial Applications". IEEE Transactions on Mobile Computing. 13 (1): 159–173. doi:10.1109/TMC.2012.247. S2CID 9831503. Archived from the original on 2020-06-26. Retrieved 2019-12-01. https://escholarship.org/uc/item/55d6c8x2
Zhangwei, H.; Mingjun, X. (April 2010). "A Distributed Spatial Cloaking Protocol for Location Privacy". 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2. S2CID 23473560. 978-1-4244-6597-2
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Zhao, Dapeng; Jin, Yuanyuan; Zhang, Kai; Wang, Xiaoling; Hung, Patrick C. K.; Ji, Wendi (2018-01-01). "EPLA: efficient personal location anonymity". GeoInformatica. 22 (1): 29–47. Bibcode:2018GInfo..22...29Z. doi:10.1007/s10707-017-0303-4. S2CID 41389738. /wiki/Bibcode_(identifier)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Chow, Chi-Yin; Mokbel, Mohamed F.; Liu, Xuan (2011-04-01). "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments". GeoInformatica. 15 (2): 351–380. Bibcode:2011GInfo..15..351C. doi:10.1007/s10707-009-0099-y. S2CID 17630799. /wiki/Bibcode_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Gibbons, Jonathan; Falcao, Veronica; Hopper, Andy; Want, Roy (1992). "The Active Badge Location System". ACM Transactions on Information Systems. 10: 91–102. doi:10.1145/128756.128759. S2CID 399279. https://doi.org/10.1145%2F128756.128759
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Chow, Chi-Yin; Mokbel, Mohamed F.; Aref, Walid G. (1 December 2009). "Casper*: Query processing for location services without compromising privacy". ACM Transactions on Database Systems. 34 (4): 1–48. doi:10.1145/1620585.1620591. S2CID 6583100. /wiki/Doi_(identifier)
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Gruteser, Marco; Grunwald, Dirk (2003). "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking". Proceedings of the 1st international conference on Mobile systems, applications and services. MobiSys '03. New York, NY, USA: ACM. pp. 31–42. doi:10.1145/1066116.1189037. ISBN 9781450377973. S2CID 1801811. 9781450377973
Labrador, M.; Wightman Rojas, Pedro; Gonzalez, Liliana; Zurbaran, Mayra (2014). "A Survey on Privacy in Location-Based Services". Ingeniería y Desarrollo. 32 (2): 314–43. doi:10.14482/inde.32.2.6128. S2CID 59476495. https://semanticscholar.org/paper/6e1e9b977437905c005587a24212548da1bf5d6b
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Schlegel, Roman; Chow, Chi-Yin; Huang, Qiong; Wong, Duncan S. (1 October 2015). "User-Defined Privacy Grid System for Continuous Location-Based Services". IEEE Transactions on Mobile Computing. 14 (10): 2158–2172. doi:10.1109/TMC.2015.2388488. S2CID 2364389. /wiki/Doi_(identifier)
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Puttaswamy, K. P. N.; Wang, S.; Steinbauer, T.; Agrawal, D.; Abbadi, A. E.; Kruegel, C.; Zhao, B. Y. (Jan 2014). "Preserving Location Privacy in Geosocial Applications". IEEE Transactions on Mobile Computing. 13 (1): 159–173. doi:10.1109/TMC.2012.247. S2CID 9831503. Archived from the original on 2020-06-26. Retrieved 2019-12-01. https://escholarship.org/uc/item/55d6c8x2
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Snekkenes, Einar (2001). "Concepts for Personal Location Privacy Policies". Proceedings of the 3rd ACM Conference on Electronic Commerce. EC '01. New York, NY, USA: ACM. pp. 48–57. doi:10.1145/501158.501164. ISBN 978-1-58113-387-5. S2CID 1167917. 978-1-58113-387-5
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Bettini, Claudio; Wang, X. Sean; Jajodia, Sushil (2005). "Protecting Privacy Against Location-Based Personal Identification". Secure Data Management. Lecture Notes in Computer Science. Vol. 3674. pp. 185–199. doi:10.1007/11552338_13. ISBN 978-3-540-28798-8. S2CID 14210673. 978-3-540-28798-8
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Mislove, Alan; Gummadi, Krishna P.; Viswanath, Bimal; Liu, Yabing; Mondal, Mainack (2014). "Understanding and Specifying Social Access Control Lists". S2CID 2618534. {{cite journal}}: Cite journal requires |journal= (help) /wiki/S2CID_(identifier)
Krumm, John (Aug 2009). "A Survey of Computational Location Privacy". Personal and Ubiquitous Computing. 13 (6): 391–399. doi:10.1007/s00779-008-0212-5. S2CID 11374739. /wiki/Doi_(identifier)
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
"A Survey on Privacy in Location-Based Services". ResearchGate. Archived from the original on 2022-01-25. Retrieved 2019-04-17. https://www.researchgate.net/publication/264496021
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Ren, Shaoqing; He, Kaiming; Girshick, Ross; Sun, Jian (1 June 2017). "Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks". IEEE Transactions on Pattern Analysis and Machine Intelligence. 39 (6): 1137–1149. arXiv:1506.01497. doi:10.1109/TPAMI.2016.2577031. PMID 27295650. S2CID 10328909. /wiki/ArXiv_(identifier)
"PlaNet - Photo Geolocation with Convolutional Neural Networks | Request PDF". ResearchGate. Archived from the original on 2022-01-25. Retrieved 2019-04-24. https://www.researchgate.net/publication/319770340
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Zhang, Chengyang; Huang, Yan (2009-06-01). "Cloaking locations for anonymous location based services: a hybrid approach". GeoInformatica. 13 (2): 159–182. Bibcode:2009GInfo..13..159Z. doi:10.1007/s10707-008-0047-2. S2CID 16329948. /wiki/Bibcode_(identifier)
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Langheinrich, Marc (2001). "Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems". In Abowd, Gregory D.; Brumitt, Barry; Shafer, Steven (eds.). Ubicomp 2001: Ubiquitous Computing. Lecture Notes in Computer Science. Vol. 2201. Springer Berlin Heidelberg. pp. 273–91. doi:10.1007/3-540-45427-6_23. ISBN 978-3-540-45427-4. S2CID 1069784. 978-3-540-45427-4
Langheinrich, Marc (2001). "Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems". In Abowd, Gregory D.; Brumitt, Barry; Shafer, Steven (eds.). Ubicomp 2001: Ubiquitous Computing. Lecture Notes in Computer Science. Vol. 2201. Springer Berlin Heidelberg. pp. 273–91. doi:10.1007/3-540-45427-6_23. ISBN 978-3-540-45427-4. S2CID 1069784. 978-3-540-45427-4
"A Survey on Privacy in Location-Based Services". ResearchGate. Archived from the original on 2022-01-25. Retrieved 2019-04-17. https://www.researchgate.net/publication/264496021
Langheinrich, Marc (2001). "Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems". In Abowd, Gregory D.; Brumitt, Barry; Shafer, Steven (eds.). Ubicomp 2001: Ubiquitous Computing. Lecture Notes in Computer Science. Vol. 2201. Springer Berlin Heidelberg. pp. 273–91. doi:10.1007/3-540-45427-6_23. ISBN 978-3-540-45427-4. S2CID 1069784. 978-3-540-45427-4
Mulligan, Deirdre (2004-08-01). "Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act". George Washington Law Review: 1557. Archived from the original on 2019-04-04. Retrieved 2019-04-25. https://scholarship.law.berkeley.edu/facpubs/2131
Koppel, Adam (2010-04-01). "Warranting A Warrant: Fourth Amendment Concerns Raised By Law Enforcement's Warrantless Use Of GPS And Cellular Phone Tracking". University of Miami Law Review. 64 (3): 1061. Archived from the original on 2019-04-04. Retrieved 2019-04-25. https://repository.law.miami.edu/umlr/vol64/iss3/7
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Liu, Bo; Zhou, Wanlei; Zhu, Tianqing; Gao, Longxiang; Xiang, Yong (2018). "Location Privacy and Its Applications: A Systematic Study". IEEE Access. 6: 17606–24. Bibcode:2018IEEEA...617606L. doi:10.1109/ACCESS.2018.2822260. hdl:10536/DRO/DU:30107496. https://doi.org/10.1109%2FACCESS.2018.2822260
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (July 2015). "A review paper on preserving privacy in mobile environments" (PDF). Journal of Network and Computer Applications. 53: 74–90. doi:10.1016/j.jnca.2015.01.008. Archived (PDF) from the original on 2019-04-28. Retrieved 2019-04-28. http://openaccess.city.ac.uk/8679/1/A%20review%20paper%20on%20preserving%20privacy%20in%20mobile%20environments%20rework%20v1.pdf
Puttaswamy, K. P. N.; Wang, S.; Steinbauer, T.; Agrawal, D.; Abbadi, A. E.; Kruegel, C.; Zhao, B. Y. (Jan 2014). "Preserving Location Privacy in Geosocial Applications". IEEE Transactions on Mobile Computing. 13 (1): 159–173. doi:10.1109/TMC.2012.247. S2CID 9831503. Archived from the original on 2020-06-26. Retrieved 2019-12-01. https://escholarship.org/uc/item/55d6c8x2
Dickman, Bethany (Jan 2011). "Untying Knotts: The Application of Mosaic Theory to GPS Surveillance in UNITED STATES V. MAYNARD". Archived from the original on 2022-01-25. Retrieved 2019-04-25. https://www.researchgate.net/publication/254568537
Koppel, Adam (2010-04-01). "Warranting A Warrant: Fourth Amendment Concerns Raised By Law Enforcement's Warrantless Use Of GPS And Cellular Phone Tracking". University of Miami Law Review. 64 (3): 1061. Archived from the original on 2019-04-04. Retrieved 2019-04-25. https://repository.law.miami.edu/umlr/vol64/iss3/7
Dickman, Bethany (Jan 2011). "Untying Knotts: The Application of Mosaic Theory to GPS Surveillance in UNITED STATES V. MAYNARD". Archived from the original on 2022-01-25. Retrieved 2019-04-25. https://www.researchgate.net/publication/254568537
Dickman, Bethany (Jan 2011). "Untying Knotts: The Application of Mosaic Theory to GPS Surveillance in UNITED STATES V. MAYNARD". Archived from the original on 2022-01-25. Retrieved 2019-04-25. https://www.researchgate.net/publication/254568537
Koppel, Adam (2010-04-01). "Warranting A Warrant: Fourth Amendment Concerns Raised By Law Enforcement's Warrantless Use Of GPS And Cellular Phone Tracking". University of Miami Law Review. 64 (3): 1061. Archived from the original on 2019-04-04. Retrieved 2019-04-25. https://repository.law.miami.edu/umlr/vol64/iss3/7
"After US v. Jones, After the Fourth Amendment Third Party Doctrine - NC Journal of Law & Technology". ncjolt.org. Archived from the original on 2016-08-11. Retrieved 2019-04-25. https://web.archive.org/web/20160811070403/http://ncjolt.org/after-us-v-jones-after-the-fourth-amendment-third-party-doctrine/
Gedik, Bugra; Liu, Ling (January 2008). "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms". IEEE Transactions on Mobile Computing. 7 (1): 1–18. doi:10.1109/TMC.2007.1062. S2CID 206745338. /wiki/Ling_Liu_(computer_scientist)
Snekkenes, Einar (2001). "Concepts for Personal Location Privacy Policies". Proceedings of the 3rd ACM Conference on Electronic Commerce. EC '01. New York, NY, USA: ACM. pp. 48–57. doi:10.1145/501158.501164. ISBN 978-1-58113-387-5. S2CID 1167917. 978-1-58113-387-5