Lenzini, Gabriele ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Mauw, Sjouke ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Pang, Jun ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
yes
Language :
English
Title :
Selective location blinding using hash chains
Publication date :
2011
Event name :
19th International Workshop on Security Protocols
Event place :
Cambridge, United Kingdom
Event date :
2011
Audience :
International
Main work title :
Proc. 19th International Workshop on Security Protocols
Balasch, J., Rial, A., Troncoso, C., Geuens, C.: PrETP: Privacy-preserving electronic toll pricing. In: Proc. USENIX Security Symposium, pp. 63-78. USENIX (2010)
Cheng, R., Zhang, Y., Hwang, J., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393-412. Springer, Heidelberg (2006)
Chow, C.-Y., Mokbel, M.F., Aref, W.G.: Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems 34(4), 1-48 (2009)
Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 324-337. ACM Press (2009)
Graham, M., Gray, D.: Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 160-171. Springer, Heidelberg (2009)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. 1st Conference on Mobile Systems, Applications, and Services. USENIX (2003)
Harpes, C., Jager, B., Gent, B.: Secure localisation with location assurance provider. In: Proc. European Navigation Conference - Global Navigation Satellite Systems (2009)
Kalman, R.E.: A new approach to linear filtering and prediction problems. Journal of Basic Engineering 82(1), 35-45 (1960)
Køien, G.M., Oleshchuk, V.A.: Location Privacy for Cellular Systems; Analysis and Solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 40-58. Springer, Heidelberg (2006) (Pubitemid 44071832)
Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proc. 5th ACM Workshop on Privacy in the Electronic Society, pp. 19-28. ACM Press (2006)
Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: Protecting privacy in location-based vehicular services. In: Proc. USENIX Security Symposium, pp. 335-350. USENIX (2009)
Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proc. 10th Workshop on Mobile Computing Systems and Applications. ACM Press (2009)
Sastry, N., Shankar, U.,Wagner, D.: Secure verification of location claims. In: Proc. ACM Workshop on Wireless Security, pp. 1-10. ACM Press (2003)
Warner, J.S., Johnston, R.G.: A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration 25, 19-28 (2002)
Winterbottom, J., Thomson, M., Tschofenig, H.: GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations. Tech. Rep. RFC 5491, IETF Network Working Group (March 2009)
Zhong, G., Hengartner, U.: Toward a distributed k-anonymity protocol for location privacy. In: Proc. 7th ACM Workshop on Privacy in the Electronic Society, pp. 33-38. ACM Press (2008)