DOI: 10.1007/978-3-540-73540-3_13
|View full text |Cite
|
Sign up to set email alerts
|

MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
134
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 142 publications
(134 citation statements)
references
References 9 publications
0
134
0
Order By: Relevance
“…To avoid the use of TTP, many mobile device-based schemes [4,6,9,10,14,15,[29][30][31][32][33] are introduced into LBS privacy protection LBS system. However, k-anonymity based schemes [10,13,[29][30][31][32][33] still need to generate CR via exchanged information from other encountered mobile users.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
See 2 more Smart Citations
“…To avoid the use of TTP, many mobile device-based schemes [4,6,9,10,14,15,[29][30][31][32][33] are introduced into LBS privacy protection LBS system. However, k-anonymity based schemes [10,13,[29][30][31][32][33] still need to generate CR via exchanged information from other encountered mobile users.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
“…However, k-anonymity based schemes [10,13,[29][30][31][32][33] still need to generate CR via exchanged information from other encountered mobile users. Thus, they also cannot resist homogeneity attacks and background knowledge attacks.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Various models of privacy protection systems have been proposed to support privacy-preserving and efficient data communication between mobile clients and servers, including client/server models [4], trusted third party models [5,13,19] and distributed models [7,8]. While the client/server model is simpler to implement, due to the lack of global knowledge in client side, the protection cost is in general higher with lower protection quality.…”
Section: Related Workmentioning
confidence: 99%
“…The privacy is generally measured by K-anonymity [6,7] requirements. Two main approaches have been proposed for location anonymizing: centralized [8][9][10][11][12][13] and decentralized [14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%