2006
DOI: 10.1007/11957454_1
|View full text |Cite
|
Sign up to set email alerts
|

Privacy for Public Transportation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
55
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(55 citation statements)
references
References 19 publications
0
55
0
Order By: Relevance
“…We can use this metric to evaluate the presence of a specific patterns in the shared dataset. Another interesting work in this direction is [61] which operates by complementing existing techniques with post randomization methods.…”
Section: Business Intelligencementioning
confidence: 99%
“…We can use this metric to evaluate the presence of a specific patterns in the shared dataset. Another interesting work in this direction is [61] which operates by complementing existing techniques with post randomization methods.…”
Section: Business Intelligencementioning
confidence: 99%
“…Pirker et al described how to make use of certain hardware capabilities of some mobile phones to build a secure, NFC-based, privacy-preserving, prepaid payment system [30], but the system requires the devices accepting a payment to be online at all times. Heydt-Benjamin et al [23] proposed the use of recent advances in anonymous credentials and e-cash to design offline privacy-preserving public transportation payment systems. They consider a hybrid system with two kinds of tickets: passive RFID transponders and embedded systems such as cell phones.…”
Section: Related Workmentioning
confidence: 99%
“…A common application of such cyber-physical systems is billing, e.g. for toll collection [2,22,26], public transportation [11,17,28], or electric vehicle charging [21]. The cyber-physical sensor records our identity, time, location and consumption.…”
Section: Introductionmentioning
confidence: 99%
“…No information -in the clear -is revealed during this process. This approach has been taken in [2,11,17,21,22,26,28]. Similar approaches can be realized using secure multi-party computation [4, 5, 13-16, 18, 19, 30].…”
Section: Introductionmentioning
confidence: 99%