-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathlibrary.bib
1046 lines (990 loc) · 35.3 KB
/
library.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
@article{Kobsa:2007vz,
author = {Kobsa, A},
title = {{Privacy-enhanced personalization}},
journal = {Communications of the ACM},
year = {2007}
}
@article{YaoChungFanArbeeLPChen:2010to,
author = {Fan, Yao-Chung and Chen, Arbee L. P.},
title = {Efficient and Robust Schemes for Sensor Data Aggregation Based on Linear Counting},
journal = {IEEE Trans. Parallel Distrib. Syst.},
issue_date = {November 2010},
volume = {21},
issue = {11},
year = {2010},
issn = {1045-9219},
pages = {1675--1691},
numpages = {17},
acmid = {1908085},
publisher = {IEEE Press},
address = {Piscataway, NJ, USA},
keywords = {Wireless sensor networks, query processing, distributed data structures, reliability and robustness.},
}
@article{Whang:1990uh,
author = {Whang, KY and Vander-Zanden, BT and Taylor, HM},
title = {{A linear-time probabilistic counting algorithm for database applications}},
journal = {ACM Transactions on Database Systems (TODS)},
year = {1990},
volume = {15},
number = {2},
pages = {229}
}
@article{Durand:2003tc,
author = {Durand, M and Flajolet, P},
title = {{Loglog counting of large cardinalities}},
journal = {Algorithms-ESA 2003},
year = {2003},
pages = {605--617}
}
@article{Considine:2004vx,
author = {Considine, J and Li, F and Kollios, G and Byers, J},
title = {{Approximate aggregation techniques for sensor databases}},
journal = {Data Engineering, 2004. Proceedings. 20th International Conference on},
year = {2004},
pages = {449--460}
}
@INPROCEEDINGS{Fusy:2007um,
author = {Éric Fusy and Olivier G and Frédéric Meunier},
title = {Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm},
booktitle = {In AofA ’07: Proceedings of the 2007 International Conference on Analysis of Algorithms},
year = 2007
}
@article{Flajolet:1985wd,
author = {Flajolet, P and Nigel Martin, G},
title = {{Probabilistic counting algorithms for data base applications}},
journal = {Journal of Computer and System Sciences},
year = {1985},
volume = {31},
number = {2},
pages = {182--209}
}
@article{Rashid:2008vu,
author = {Rashid, O and Coulton, P},
title = {{Providing location based information/advertising for existing mobile phone users}},
journal = {Personal and Ubiquitous Computing},
year = {2008}
}
@article{Fan:2008wl,
author = {Fan, YC and Chen, ALP},
title = {{Efficient and robust sensor data aggregation using linear counting sketches}},
journal = {IPDPS 2008. IEEE International Symposium on Parallel and Distributed Processing, 2008},
year = 2008,
pages = {1--12}
}
@article{Ntarmos:2006uj,
author = {Ntarmos, N and Triantafillou, P and Weikum, G},
title = {{Counting at large: Efficient cardinality estimation in internet-scale data networks}},
year = {2006}
}
@article{Broder:2004ux,
author = {Broder, A and Mitzenmacher, M},
title = {{Network applications of bloom filters: A survey}},
journal = {Internet Mathematics},
year = {2004},
volume = {1},
number = {4},
pages = {485--509}
}
@article{heerde2006data,
title={Data degradation to enhance privacy for the Ambient Intelligence},
author={Heerde, H.J.W. and Anciaux, N.},
year={2006},
publisher={Centre for Telematics and Information Technology, University of Twente}
}
@article{Gruteser:2005wz,
author = {Gruteser, M and Grunwald, D},
title = {{Enhancing location privacy in wireless LAN through disposable interface identifiers}},
journal = {Mobile Networks and Applications},
year = {2005}
}
@article{Ohm:2010tc,
author = {Ohm, P},
title = {{SSRN-Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization by Paul Ohm}},
journal = {UCLA L Rev},
year = {2010}
}
@article{Penn:2008wq,
author = {Penn, A and O'Neill, E},
title = {{Mapping, sensing and visualising the digital co-presence in the public arena}},
year = {2008}
}
@article{Shin:2010uo,
author = {Shin, M and Cornelius, C and Peebles, D and Kapadia, A},
title = {{ScienceDirect - Pervasive and Mobile Computing : AnonySense: A system for anonymous opportunistic sensing}},
journal = {Pervasive and Mobile {\ldots}},
year = {2010}
}
@article{Evans:2009vb,
author = {Evans, D and Warren, RH},
title = {{Anonymity properties of stored or transmitted data taken from Bluetooth scans}},
journal = {Computational Science and Engineering, 2009. CSE'09. International Conference on},
year = {2009},
volume = {3},
pages = {133--138}
}
@article{Lakkaraju:2008vd,
author = {Lakkaraju, K},
title = {{Evaluating the utility of anonymized network traces for intrusion detection}},
journal = {{\ldots} of the 4th international conference on {\ldots}},
year = {2008}
}
@article{Cormode:2009uj,
author = {Cormode, G and Tirthapura, S},
title = {{Time-decaying sketches for robust aggregation of sensor data}},
journal = {SIAM Journal on Computing},
year = {2009}
}
@article{Oneill:2006vq,
author = {O neill, E and Kostakos, V and Kindberg, T and Schiek, A and Penn, A and Fraser, D and Jones, T},
title = {{Instrumenting the city: Developing methods for observing and understanding the digital cityscape}},
journal = {UbiComp 2006: Ubiquitous Computing},
year = {2006},
pages = {315--332}
}
@article{Wang:2007vd,
author = {Wang, J},
title = {{Space-Code Bloom Filter for Efficient Per-Flow Traffic Measurement Abhishek Kumar}},
journal = {en.scientificcommons.org},
year = {2007}
}
@article{Bonomi:2006tj,
author = {Bonomi, F and Mitzenmacher, M and Panigrahy, R and Singh, S and Varghese, G},
title = {{An improved construction for counting bloom filters}},
journal = {Algorithms--ESA 2006},
year = {2006},
pages = {684--695}
}
@article{Kennedy:2009dn,
author = {Kennedy, O. and Koch, C. and Demers, A.},
title = {{Dynamic Approaches to In-network Aggregation}},
year = {2009},
pages = {1331--1334}
}
@article{Sackmann:2006vz,
author = {Sackmann, S and Str{\"u}ker, J},
title = {{Personalization in privacy-aware highly dynamic systems}},
journal = {Communications of the ACM},
year = {2006}
}
@article{Mitzenmacher:2008wx,
author = {Mitzenmacher, M},
title = {{Why simple hash functions work: exploiting the entropy in a data stream}},
journal = {{\ldots} of the nineteenth annual ACM-SIAM {\ldots}},
year = {2008}
}
@article{MarkusMaron:2009wh,
author = {Markus Maron, Sebastian Magnus Kevin Read},
title = {{An Empirical Study to Evaluate the Location of Advertisement Panels by Using a Mobile Marketing Tool}},
year = {2009},
month = {jun}
}
@article{Koivumaki:2008wa,
author = {Koivum{\"a}ki, T and Ristola, A},
title = {{SpringerLink - Personal and Ubiquitous Computing, Volume 12, Number 1}},
journal = {Personal and Ubiquitous Computing},
year = {2008}
}
@article{Xiong:2009wx,
author = {Xiong, Li},
title = {{Achieving Privacy for Both Data Subjects and Data Providers}},
journal = {Data and Applications Security XXIII},
year = {2009}
}
@article{Shilton:2009tw,
author = {Shilton, K},
title = {{Four billion little brothers?}},
journal = {Communications of the ACM},
year = {2009}
}
@article{Langheinrich:wa,
author = {Langheinrich, M},
title = {{Privacy in ubiquitous computing}},
journal = {Ubiqutious Computing Fundamentals}
}
@article{Rogaway:2004to,
author = {Rogaway, P},
title = {{Cryptographic Hash-Function Basics}},
year = {2004}
}
@article{Almeida2007,
author = {Almeida, P and Baquero, C and Preguica, N and Hutchison, D},
doi = {10.1016/j.ipl.2006.10.007},
file = {:Volumes/DADOS/AUM/MEI/Dissertation/Papers/scalable bloom filters.pdf:pdf},
issn = {00200190},
journal = {Information Processing Letters},
keywords = {bloom filters,data structures,dis-,expected,lower false positive rates,require more state},
month = mar,
number = {6},
pages = {255--261},
title = {{Scalable Bloom Filters}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0020019006003127},
volume = {101},
year = {2007}
}
@article{Bloom1970,
author = {Bloom, Burton H.},
doi = {10.1145/362686.362692},
file = {:Volumes/DADOS/AUM/MEI/Dissertation/Papers/10.1.1.20.2080.pdf:pdf},
issn = {00010782},
journal = {Communications of the ACM},
keywords = {and phrases,hash addressing,hash coding,retrieval efficiency,retrieval trade-offs,scatter storage,searching,storage,storage layout},
month = jul,
number = {7},
pages = {422--426},
title = {{Space/time trade-offs in hash coding with allowable errors}},
url = {http://portal.acm.org/citation.cfm?doid=362686.362692},
volume = {13},
year = {1970}
}
@article{Bonomi2006,
author = {Bonomi, Flavio and Mitzenmacher, Michael and Panigrahy, Rina and Singh, Sushil and Varghese, George},
file = {:Volumes/DADOS/AUM/MEI/Dissertation/Papers/improved counting filters.pdf:pdf},
journal = {Construction},
pages = {684--695},
title = {{An Improved Construction for Counting Bloom Filters}},
year = {2006}
}
@article{Broder,
author = {Broder, Andrei and Mitzenmacher, Michael},
file = {:Volumes/DADOS/AUM/MEI/Dissertation/Papers/Bloom Filters Survey.pdf:pdf},
journal = {Internet Mathematics},
number = {4},
pages = {485--509},
title = {{Network Applications of Bloom Filters : A Survey}},
volume = {1}
}
@article{Evans2009,
author = {Evans, David and Warren, Robert H.},
doi = {10.1109/CSE.2009.380},
file = {:Volumes/DADOS/AUM/MEI/Dissertation/Papers/10.1.1.159.2363.pdf:pdf},
isbn = {978-1-4244-5334-4},
journal = {2009 International Conference on Computational Science and Engineering},
month = aug,
pages = {133--138},
publisher = {Ieee},
title = {{Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5283363},
year = {2009}
}
@article{Guo,
author = {Guo, Deke and He, Yuan and Liu, Yunhao},
file = {:Volumes/DADOS/AUM/MEI/Dissertation/Papers/weak state routing using decay bloom filters.pdf:pdf},
journal = {Science And Technology},
title = {{Wader : Weak State Routing Using Decay Bloom Filters}}
}
@article{ohmPaul,
abstract = {{Computer scientists have recently undermined our faith in the privacy-protecting power of anonymization, the name for techniques for protecting the privacy of individuals in large databases by deleting information like names and social security numbers. These scientists have demonstrated they can often 'reidentify' or 'deanonymize' individuals hidden in anonymized data with astonishing ease. By understanding this research, we will realize we have made a mistake, labored beneath a fundamental misunderstanding, which has assured us much less privacy than we have assumed. This mistake pervades nearly every information privacy law, regulation, and debate, yet regulators and legal scholars have paid it scant attention. We must respond to the surprising failure of anonymization, and this Article provides the tools to do so.}},
address = {Los Angeles, CA, USA},
author = {Ohm, Paul},
citeulike-article-id = 5741085,
citeulike-linkout-0 = {http://uclalawreview.org/?p=1353},
citeulike-linkout-1 = {http://uclalawreview.org/pdf/57-6-3.pdf},
citeulike-linkout-2 = {http://ssrn.com/abstract=1450006},
citeulike-linkout-3 = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN\_ID1450006\_code487663.pdf?abstractid=1450006\&mirid=1},
editor = {Pottle, Darcy},
journal = {UCLA Law Review},
keywords = {anonymization, law, privacy, reindentification},
month = {August},
number = 6,
pages = {1701--1777},
posted-at = {2010-12-09 02:17:49},
priority = 3,
publisher = {Law School at UCLA},
title = {{Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization}},
url = {http://uclalawreview.org/?p=1353},
volume = 57,
year = 2010
}
@incollection {oneillinstrumenting,
author = {O'Neill, Eamonn and Kostakos, Vassilis and Kindberg, Tim and Schiek, Ava and Penn, Alan and Fraser, Dana and Jones, Tim},
affiliation = {Department of Computer Science, University of Bath, BA2 7AY UK UK},
title = {Instrumenting the City: Developing Methods for Observing and Understanding the Digital Cityscape},
booktitle = {UbiComp 2006: Ubiquitous Computing},
series = {Lecture Notes in Computer Science},
editor = {Dourish, Paul and Friday, Adrian},
publisher = {Springer Berlin / Heidelberg},
isbn = {},
pages = {315-332},
volume = {4206},
year = {2006}
}
@misc{ganigEtAl,
Title = "Monitoring a Mobile Device",
number = "20090210141",
author = "Young Stanley E., Tarnoff Philip , Ganig Nicholas J.",
year = "2009",
month = "August",
url = "http://www.freepatentsonline.com/y2009/0210141.html"
}
@misc{maryland_bluetooth_2008,
Title = "Bluetooth Traffic Monitoring Technology",
author = "Young Stan",
year = "2008",
month = "September",
url = "http://www.catt.umd.edu/documents/UMD-BT-Brochure_REV3.pdf"
}
@INPROCEEDINGS{Fan98summarycache:,
author = {Li Fan and Pei Cao and Jussara Almeida and Andrei Z. Broder},
title = {Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol},
booktitle = {IEEE/ACM Transactions on Networking},
year = {1998},
pages = {254--265}
}
@inproceedings{Mitzenmacher:2001,
author = {Mitzenmacher, Michael},
title = {Compressed bloom filters},
booktitle = {Proceedings of the twentieth annual ACM symposium on Principles of distributed computing},
series = {PODC '01},
year = {2001},
isbn = {1-58113-383-9},
location = {Newport, Rhode Island, United States},
pages = {144--150},
numpages = {7},
url = {http://doi.acm.org/10.1145/383962.384004},
doi = {http://doi.acm.org/10.1145/383962.384004},
acmid = {384004},
publisher = {ACM},
address = {New York, NY, USA},
}
@article{Flajolet:1985,
author = {Flajolet, Philippe and Martin, G. Nigel},
title = {Probabilistic counting algorithms for data base applications},
journal = {J. Comput. Syst. Sci.},
volume = {31},
issue = {2},
month = {September},
year = {1985},
issn = {0022-0000},
pages = {182--209},
numpages = {28},
url = {http://portal.acm.org/citation.cfm?id=5212.5215},
doi = {10.1016/0022-0000(85)90041-8},
acmid = {5215},
publisher = {Academic Press, Inc.},
address = {Orlando, FL, USA},
}
@article{Whang:1990,
author = {Whang, Kyu-Young and Vander-Zanden, Brad T. and Taylor, Howard M.},
title = {A linear-time probabilistic counting algorithm for database applications},
journal = {ACM Trans. Database Syst.},
volume = {15},
issue = {2},
month = {June},
year = {1990},
issn = {0362-5915},
pages = {208--229},
numpages = {22},
url = {http://doi.acm.org/10.1145/78922.78925},
doi = {http://doi.acm.org/10.1145/78922.78925},
acmid = {78925},
publisher = {ACM},
address = {New York, NY, USA},
}
@INPROCEEDINGS{Durand03loglogcounting,
author = {Marianne Durand and Philippe Flajolet},
title = {Loglog Counting of Large Cardinalities},
booktitle = {In ESA},
year = {2003},
pages = {605--617}
}
@INPROCEEDINGS{Flajolet07hyperloglog,
author = {Philippe Flajolet and Éric Fusy and Olivier Gandouet and et al.},
title = {Hyperloglog: The analysis of a near-optimal cardinality estimation algorithm},
booktitle = {IN AOFA ’07: PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON ANALYSIS OF ALGORITHMS},
year = {2007},
publisher = {}
}
@conference{fidge1988timestamps,
title={{Timestamps in message-passing systems that preserve the partial ordering}},
author={Fidge, C.J.},
booktitle={Proceedings of the 11th Australian Computer Science Conference},
volume={10},
number={1},
pages={56--66},
year={1988}
}
@article{mattern1989virtual,
title={{Virtual time and global states of distributed systems}},
author={Mattern, F.},
journal={Parallel and Distributed Algorithms},
pages={215--226},
year={1989},
publisher={Citeseer}
}
@article{Lamport:1978,
author = {Lamport, Leslie},
title = {Time, clocks, and the ordering of events in a distributed system},
journal = {Commun. ACM},
volume = {21},
issue = {7},
month = {July},
year = {1978},
issn = {0001-0782},
pages = {558--565},
numpages = {8},
url = {http://doi.acm.org/10.1145/359545.359563},
doi = {http://doi.acm.org/10.1145/359545.359563},
acmid = {359563},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {clock synchronization, computer networks, distributed systems, multiprocess systems},
}
@article{Baldoni,
author = {R Baldoni and M Klusch},
journal = {IEEE Distributed Systems Online},
title = {Fundamentals of distributed computing: A practical tour of vector clock systems},
number = {2},
volume = {3},
year = {2002},
date-added = {2009-12-11 18:01:05 +0000},
date-modified = {2009-12-11 18:05:37 +0000},
pmid = {3214480435188594011related:W_XbvOwgnCwJ},
local-url = {file://localhost/Users/nelson/Documents/Papers/2002/Baldoni/IEEE%20Distributed%20Systems%20Online%202002%20Baldoni.pdf},
uri = {papers://2F108873-4B5A-4268-BCAE-0F538237898A/Paper/p460},
rating = {0}
}
@article{Fidge,
author = {Colin J.Fidge},
journal = {Australian Computer Science Communications Vol.10},
title = {Timestamps in Message-Passing Systems That Preserve the Partial Ordering},
year = {1988}
}
@article{Mattern,
author = {Friedmann Mattern},
journal = {Workshop on Parallel and Distributed Algorithms},
title = {Virtual Time and Global States of Distributed Systems},
year = {1988}
}
@article{McCabe,
author = {Thomas J. McCabe},
journal = {IEEE Transactions on Software Engineering},
title = {A Complexity Measure},
year = {1976}
}
@article{Mitzenmacher:2002:CBF:581876.581878,
author = {Mitzenmacher, Michael},
title = {Compressed bloom filters},
journal = {IEEE/ACM Trans. Netw.},
volume = {10},
issue = {5},
month = {October},
year = {2002},
issn = {1063-6692},
pages = {604--612},
numpages = {9},
url = {http://dx.doi.org/10.1109/TNET.2002.803864},
doi = {http://dx.doi.org/10.1109/TNET.2002.803864},
acmid = {581878},
publisher = {IEEE Press},
address = {Piscataway, NJ, USA},
keywords = {algorithms, computer networks, distributed computing, distributed information systems, information theory},
}
@INPROCEEDINGS{Chang04approximatecaches,
author = {F. Chang and Francis Chang and Wu-chang Feng},
title = {Approximate Caches for Packet Classification},
booktitle = {In IEEE INFOCOM},
year = {2004},
pages = {2196--2207}
}
@article{huang2005privacy,
title={A privacy conscious bluetooth infrastructure for location aware computing},
author={Huang, A. and Rudolph, L.},
year={2005}
}
@article{DBLP:journals/corr/abs-cs-0610105,
author = {Arvind Narayanan and
Vitaly Shmatikov},
title = {How To Break Anonymity of the Netflix Prize Dataset},
journal = {CoRR},
volume = {abs/cs/0610105},
year = {2006},
ee = {http://arxiv.org/abs/cs/0610105},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Saponas:2007:DTY:1362903.1362908,
author = {Saponas, T. Scott and Lester, Jonathan and Hartung, Carl and Agarwal, Sameer and Kohno, Tadayoshi},
title = {Devices that tell on you: privacy trends in consumer ubiquitous computing},
booktitle = {Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium},
series = {SS'07},
year = {2007},
isbn = {111-333-5555-77-9},
location = {Boston, MA},
pages = {5:1--5:16},
articleno = {5},
numpages = {16},
url = {http://dl.acm.org/citation.cfm?id=1362903.1362908},
acmid = {1362908},
publisher = {USENIX Association},
address = {Berkeley, CA, USA},
keywords = {UbiComp, encryption, information leakage, location privacy, mobile social applications, multimedia security, privacy, variable bitrate (VBR) encoding},
}
@ARTICLE{1186725,
author={Beresford, A.R. and Stajano, F.},
journal={Pervasive Computing, IEEE}, title={Location privacy in pervasive computing},
year={2003},
month={jan-mar},
volume={2},
number={1},
pages={ 46 - 55},
keywords={ anonymous communication techniques; frequently changing pseudonyms; location privacy; location-aware applications; mix zone; pervasive computing; user anonymity metrics; data privacy;},
doi={10.1109/MPRV.2003.1186725},
ISSN={1536-1268},}
@incollection {springerlink:10.1007/978-3-642-01721-6_8,
author = {Hay, Simon and Harle, Robert},
affiliation = {University of Cambridge Computer Laboratory},
title = {Bluetooth Tracking without Discoverability},
booktitle = {Location and Context Awareness},
series = {Lecture Notes in Computer Science},
editor = {Choudhury, Tanzeem and Quigley, Aaron and Strang, Thomas and Suginuma, Koji},
publisher = {Springer Berlin / Heidelberg},
isbn = {978-3-642-01720-9},
keyword = {Computer Science},
pages = {120-137},
volume = {5561},
url = {http://dx.doi.org/10.1007/978-3-642-01721-6_8},
note = {10.1007/978-3-642-01721-6_8},
year = {2009}
}
@inproceedings{anciaux2008instantdb,
title={InstantDB: enforcing timely degradation of sensitive data},
author={Anciaux, N. and Bouganim, L. and Van Heerde, H. and Pucheral, P. and Apers, P.M.G.},
booktitle={Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on},
pages={1373--1375},
year={2008},
organization={IEEE}
}
@inproceedings{freudiger2009optimal,
title={On the optimal placement of mix zones},
author={Freudiger, J. and Shokri, R. and Hubaux, J.P.},
booktitle={Privacy Enhancing Technologies},
pages={216--234},
year={2009},
organization={Springer}
}
@incollection {springerlink:10.1007/11601494_15,
author = {Wong, Ford-Long and Stajano, Frank},
affiliation = {Computer Laboratory, University of Cambridge},
title = {Location Privacy in Bluetooth},
booktitle = {Security and Privacy in Ad-hoc and Sensor Networks},
series = {Lecture Notes in Computer Science},
editor = {Molva, Refik and Tsudik, Gene and Westhoff, Dirk},
publisher = {Springer Berlin / Heidelberg},
isbn = {978-3-540-30912-3},
keyword = {Computer Science},
pages = {176-188},
volume = {3813},
url = {http://dx.doi.org/10.1007/11601494_15},
note = {10.1007/11601494_15},
year = {2005}
}
@inproceedings{gruteser2003anonymous,
title={Anonymous usage of location-based services through spatial and temporal cloaking},
author={Gruteser, M. and Grunwald, D.},
booktitle={Proceedings of the 1st international conference on Mobile systems, applications and services},
pages={31--42},
year={2003},
organization={ACM}
}
@inproceedings{leguay2006opportunistic,
title={Opportunistic content distribution in an urban setting},
author={Leguay, J. and Lindgren, A. and Scott, J. and Friedman, T. and Crowcroft, J.},
booktitle={Proceedings of the 2006 SIGCOMM workshop on Challenged networks},
pages={205--212},
year={2006},
organization={ACM}
}
@article{duckham2006location,
title={Location privacy and location-aware computing},
author={Duckham, M. and Kulik, L.},
journal={Dynamic \& mobile GIS: investigating change in space and time},
pages={34--51},
year={2006},
publisher={CRC Press Boca Raton, FL}
}
@article{westin1968privacy,
title={Privacy and freedom},
author={Westin, A.F.},
journal={Washington and Lee Law Review},
volume={25},
number={1},
pages={166},
year={1968}
}
@inproceedings{wang2008location,
title={Location based services for mobiles: Technologies and standards},
author={Wang, S. and Min, J. and Byung, K.Y.},
year={2008}
}
@article{kostakos2009understanding,
title={Understanding and measuring the urban pervasive infrastructure},
author={Kostakos, V. and Nicolai, T. and Yoneki, E. and O’Neill, E. and Kenn, H. and Crowcroft, J.},
journal={Personal and Ubiquitous Computing},
volume={13},
number={5},
pages={355--364},
year={2009},
publisher={Springer}
}
@article{shokri2010unified,
title={A unified framework for location privacy},
author={Shokri, R. and Freudiger, J. and Hubaux, J.P.},
journal={3rd Hot Topics in Privacy Enhancing Technologies (HotPETs)},
year={2010}
}
@article{Junglas:2008:LS:1325555.1325568,
author = {Junglas, Iris A. and Watson, Richard T.},
title = {Location-based services},
journal = {Commun. ACM},
issue_date = {March 2008},
volume = {51},
number = {3},
month = mar,
year = {2008},
issn = {0001-0782},
pages = {65--69},
numpages = {5},
url = {http://doi.acm.org/10.1145/1325555.1325568},
doi = {10.1145/1325555.1325568},
acmid = {1325568},
publisher = {ACM},
address = {New York, NY, USA},
}
@article{Terrovitis:2011:PPD:2031331.2031334,
author = {Terrovitis, Manolis},
title = {Privacy preservation in the dissemination of location data},
journal = {SIGKDD Explor. Newsl.},
issue_date = {June 2011},
volume = {13},
number = {1},
month = aug,
year = {2011},
issn = {1931-0145},
pages = {6--18},
numpages = {13},
url = {http://doi.acm.org/10.1145/2031331.2031334},
doi = {10.1145/2031331.2031334},
acmid = {2031334},
publisher = {ACM},
address = {New York, NY, USA},
}
@inproceedings{Cvrcek:2006:SVL:1179601.1179621,
author = {Cvrcek, Dan and Kumpost, Marek and Matyas, Vashek and Danezis, George},
title = {A study on the value of location privacy},
booktitle = {Proceedings of the 5th ACM workshop on Privacy in electronic society},
series = {WPES '06},
year = {2006},
isbn = {1-59593-556-8},
location = {Alexandria, Virginia, USA},
pages = {109--118},
numpages = {10},
url = {http://doi.acm.org/10.1145/1179601.1179621},
doi = {10.1145/1179601.1179621},
acmid = {1179621},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {economics, experiment, location privacy, mobile phone, mobile service},
}
@inproceedings{Brush:2010:EEU:1864349.1864381,
author = {Brush, A.J. Bernheim and Krumm, John and Scott, James},
title = {Exploring end user preferences for location obfuscation, location-based services, and the value of location},
booktitle = {Proceedings of the 12th ACM international conference on Ubiquitous computing},
series = {Ubicomp '10},
year = {2010},
isbn = {978-1-60558-843-8},
location = {Copenhagen, Denmark},
pages = {95--104},
numpages = {10},
url = {http://doi.acm.org/10.1145/1864349.1864381},
doi = {10.1145/1864349.1864381},
acmid = {1864381},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {anonymization, computational location privacy, location, obfuscation, privacy},
}
@inproceedings{quercia2010recommending,
title={Recommending social events from mobile phone location data},
author={Quercia, D. and Lathia, N. and Calabrese, F. and Di Lorenzo, G. and Crowcroft, J.},
booktitle={Data Mining (ICDM), 2010 IEEE 10th International Conference on},
pages={971--976},
year={2010},
organization={IEEE}
}
@article{zibuschka2011location,
title={Location-based services},
author={Zibuschka, J. and Rannenberg, K. and K{\"o}lsch, T.},
journal={Digital privacy},
pages={679--695},
year={2011},
publisher={Springer}
}
@article{zickuhr2012three,
title={Three-quarters of smartphone owners use location-based services},
author={Zickuhr, K.},
journal={Pew Internet \& American Life Project (May 11, 2012)},
year={2012}
}
@article{gruteser2005anonymity,
title={On the anonymity of periodic location samples},
author={Gruteser, M. and Hoh, B.},
journal={Security in Pervasive Computing},
pages={179--192},
year={2005},
publisher={Springer}
}
@inproceedings{xu2007location,
title={Location anonymity in continuous location-based services},
author={Xu, T. and Cai, Y.},
booktitle={Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems},
pages={39},
year={2007},
organization={ACM}
}
@ONLINE{Dybwad:2009:Online,
author = {Dybwad, Barb},
title = {Think Twice: That Facebook Update Could Get You Robbed},
month = aug,
year = {2009},
url = {http://mashable.com/2009/08/27/facebook-burglary/}
}
@ONLINE{Grove:2009:Online,
author = {Van Grove, Jennifer},
title = {Twitter Your Way to Getting Robbed},
month = jun,
year = {2009},
url = {http://mashable.com/2009/06/01/twitter-related-burglary/}
}
@inproceedings{ahern2007over,
title={Over-exposed?: privacy patterns and considerations in online and mobile photo sharing},
author={Ahern, S. and Eckles, D. and Good, N.S. and King, S. and Naaman, M. and Nair, R.},
booktitle={Conference on Human Factors in Computing Systems: Proceedings of the SIGCHI conference on Human factors in computing systems},
volume={28},
pages={357--366},
year={2007}
}
@inproceedings{colbert2001diary,
title={A diary study of rendezvousing: implications for position-aware computing and communications for the general public},
author={Colbert, M.},
booktitle={Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work},
pages={15--23},
year={2001},
organization={ACM}
}
@article{kaasinen2003user,
title={User needs for location-aware mobile services},
author={Kaasinen, E.},
journal={Personal and ubiquitous computing},
volume={7},
number={1},
pages={70--79},
year={2003},
publisher={Springer}
}
@article{dalenius1986finding,
title={Finding a needle in a haystack-or identifying anonymous census record},
author={Dalenius, T.},
journal={Journal of official statistics},
volume={2},
number={3},
pages={329--336},
year={1986}
}
@techreport{samarati1998protecting,
title={Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression},
author={Samarati, P. and Sweeney, L.},
year={1998},
institution={Technical report, SRI International}
}
@article{gedik2008protecting,
title={Protecting location privacy with personalized k-anonymity: Architecture and algorithms},
author={Gedik, B. and Liu, L.},
journal={Mobile Computing, IEEE Transactions on},
volume={7},
number={1},
pages={1--18},
year={2008},
publisher={IEEE}
}
@inproceedings{gedik2005location,
title={Location privacy in mobile systems: A personalized anonymization model},
author={Gedik, B. and Liu, L.},
booktitle={Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on},
pages={620--629},
year={2005},
organization={IEEE}
}
@inproceedings{mokbel2006new,
title={The new Casper: query processing for location services without compromising privacy},
author={Mokbel, M.F. and Chow, C.Y. and Aref, W.G.},
booktitle={Proceedings of the 32nd international conference on Very large data bases},
pages={763--774},
year={2006},
organization={VLDB Endowment}
}
@inproceedings{ghinita2007prive,
title={PRIVE: anonymous location-based queries in distributed mobile systems},
author={Ghinita, G. and Kalnis, P. and Skiadopoulos, S.},
booktitle={Proceedings of the 16th international conference on World Wide Web},
pages={371--380},
year={2007},
organization={ACM}
}
@inproceedings{wong2007minimality,
title={Minimality attack in privacy preserving data publishing},
author={Wong, R.C.W. and Fu, A.W.C. and Wang, K. and Pei, J.},
booktitle={Proceedings of the 33rd international conference on Very large data bases},
pages={543--554},
year={2007},
organization={VLDB Endowment}
}
@article{duckham2005formal,
title={A formal model of obfuscation and negotiation for location privacy},
author={Duckham, M. and Kulik, L.},
journal={Pervasive Computing},
pages={243--251},
year={2005},
publisher={Springer}
}
@article{ardagna2011obfuscation,
title={An obfuscation-based approach for protecting location privacy},
author={Ardagna, C.A. and Cremonini, M. and De Capitani di Vimercati, S. and Samarati, P.},
journal={Dependable and Secure Computing, IEEE Transactions on},
volume={8},
number={1},
pages={13--27},
year={2011},
publisher={IEEE}
}
@inproceedings{langheinrich2001privacy,
title={Privacy by design—principles of privacy-aware ubiquitous systems},
author={Langheinrich, M.},
booktitle={Ubicomp 2001: Ubiquitous Computing},
pages={273--291},
year={2001},
organization={Springer}
}
@article{duckham2001formal,
title={A formal approach to imperfection in geographic information},
author={Duckham, M. and Mason, K. and Stell, J. and Worboys, M.},
journal={Computers, Environment and Urban Systems},
volume={25},
number={1},
pages={89--103},
year={2001},
publisher={Elsevier}
}
@article{ardagna2007middleware,
title={A middleware architecture for integrating privacy preferences and location accuracy},
author={Ardagna, C. and Crcmonini, M. and Damiani, E. and De Vimercati, S. and Samarati, P.},
journal={New Approaches for Security, Privacy and Trust in Complex Environments},
pages={313--324},
year={2007},
publisher={Springer}
}
@article{ardagna2007location,
title={Location privacy protection through obfuscation-based techniques},
author={Ardagna, C. and Cremonini, M. and Damiani, E. and De Capitani di Vimercati, S. and Samarati, P.},
journal={Data and Applications Security XXI},
pages={47--60},
year={2007},
publisher={Springer}
}
@misc{knuth1998art,
title={The Art of Computer Programming, Vol. 3, Sorting and Searching},
author={Knuth, D.E.},
year={1998},
publisher={Addison-Wesley}
}
@article{charron1991concerning,
title={Concerning the size of logical clocks in distributed systems},
author={Charron-Bost, B.},
journal={Information Processing Letters},
volume={39},
number={1},
pages={11--16},
year={1991},
publisher={Elsevier North-Holland, Inc.}
}
@article{bettini2005protecting,
title={Protecting privacy against location-based personal identification},
author={Bettini, C. and Wang, X. and Jajodia, S.},
journal={Secure Data Management},
pages={185--199},
year={2005},
publisher={Springer}
}
@article{hoh2006enhancing,
title={Enhancing security and privacy in traffic-monitoring systems},
author={Hoh, B. and Gruteser, M. and Xiong, H. and Alrabady, A.},
journal={Pervasive Computing, IEEE},
volume={5},
number={4},
pages={38--46},
year={2006},
publisher={IEEE}
}
@article{hightower2005learning,
title={Learning and recognizing the places we go},
author={Hightower, J. and Consolvo, S. and LaMarca, A. and Smith, I. and Hughes, J.},
journal={UbiComp 2005: Ubiquitous Computing},
pages={903--903},
year={2005},
publisher={Springer}
}
@article{froehlich2008route,
title={Route prediction from trip observations},
author={Froehlich, J. and Krumm, J.},
journal={SAE SP},
volume={2193},
pages={53},
year={2008},
publisher={SOCIETY OF AUTOMOTIVE ENGINEERS INC.}
}
@article{krumm2006predestination,
title={Predestination: Inferring destinations from partial trajectories},
author={Krumm, J. and Horvitz, E.},