Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geogr...
source link: https://dl.acm.org/doi/proceedings/10.1145/2675682
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
- Association for Computing Machinery
- New York
- United States
Bibliometrics
Abstract
No abstract available.
Proceeding Downloads
Venue attacks in location-based social networks
Location-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place, have attracted many people, including business owners who use LBSNs to promote their … (More)
A grid-based location privacy-preserving method for LBS users
With the availability and rapid development of GPS-enabled mobile devices and the positioning technology, the Location-Based Services (LBS), aiming at providing customized … (More)
A spatial entropy-based approach to improve mobile risk-based authentication
The research presented in this paper develops a novel approach for a risk-based authentication system that takes into account mobile user movement patterns. Inspired by the … (More)
SUDO: a secure database outsourcing solution for location-based systems
Location-based systems (LBS) represent an emerging genre of applications that exploit positioning technologies and facilitate a wide range of location-based services. … (More)
A civilized cyberspace for geoprivacy
We argue that current technical and legal attempts aimed at protecting Geoprivacy are insufficient. We propose a novel 2-dimensional model of privacy, which we term … (More)
Protecting patient geo-privacy via a triangular displacement geo-masking method
Protecting patient geo-privacy while allowing for valid geographic analyses of the data is a major challenge [1]. As a consequence, a variety of methods have been introduced to mask … (More)
Quantity based aggregation for cadastral databases
Quantity Based Aggregation (QBA) is a subject that is closely related to inference in databases. The goal is to enforce k out of N disclosure control. In this paper we work on QBA … (More)
Contributors
Carsten Keßler
Hunter College, City University of New York- Citation count88
- Publication counts12
- Publication Years2007 - 2015
- Available for Download2
- Downloads (cumulative)84
- Downloads (12 months)35
- Downloads (6 weeks)2
Grant D McKenzie
University of California, Santa Barbara- Citation count30
- Publication counts12
- Publication Years2013 - 2018
- Available for Download6
- Downloads (cumulative)758
- Downloads (12 months)77
- Downloads (6 weeks)3
Lars Kulik
University of Melbourne, Australia- Citation count935
- Publication counts111
- Publication Years2003 - 2020
- Available for Download71
- Downloads (cumulative)18,733
- Downloads (12 months)2,753
- Downloads (6 weeks)258
Acceptance Rates
Comments
About Cookies On This Site
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK