2010
DOI: 10.1007/s10115-010-0286-z
|View full text |Cite
|
Sign up to set email alerts
|

Location privacy: going beyond K-anonymity, cloaking and anonymizers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
66
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 90 publications
(66 citation statements)
references
References 27 publications
0
66
0
Order By: Relevance
“…Although, among them, policy-based approaches and cryptographybased approaches [14] have also been investigated, most existing works are based on location obfuscation. For location obfuscation mechanisms, most of them employ well-known location k-anonymity to protect user's privacy by blurring user's exact location into a sufficiently larger CR.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
See 4 more Smart Citations
“…Although, among them, policy-based approaches and cryptographybased approaches [14] have also been investigated, most existing works are based on location obfuscation. For location obfuscation mechanisms, most of them employ well-known location k-anonymity to protect user's privacy by blurring user's exact location into a sufficiently larger CR.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
“…To avoid the use of TTP, many mobile device-based schemes [4,6,9,10,14,15,[29][30][31][32][33] are introduced into LBS privacy protection LBS system. However, k-anonymity based schemes [10,13,[29][30][31][32][33] still need to generate CR via exchanged information from other encountered mobile users.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
See 3 more Smart Citations