SBBD

Paper Registration

1

Select Book

2

Select Paper

3

Fill in paper information

4

Congratulations

Fill in your paper information

English Information

(*) To change the order drag the item to the new position.

Authors
# Name
1 Eduardo Neto(eduardo.rodrigues@lsbd.ufc.br)
2 Andre Mendonça(andre@lsbd.ufc.br)
3 Felipe Brito(felipe.timbo@lsbd.ufc.br)
4 Javam Machado(javam.machado@lsbd.ufc.br)

(*) To change the order drag the item to the new position.

Reference
# Reference
1 Gedik, B. and Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7(1):1–18.
2 Kido, H., Yanagisawa, Y., and Satoh, T. (2005). An anonymous communication technique using dummies for location-based services. In ICPS ’05. Proceedings. International Conference on Pervasive Services, 2005., pages 88–97.
3 Li, H., Sun, L., Zhu, H., Lu, X., and Cheng, X. (2014). Achieving privacy preservation in wifi fingerprint-based localization. In INFOCOM, 2014 Proceedings IEEE, pages 2337–2345. IEEE.
4 Lu, R., Lin, X., Shi, Z., and Shao, J. (2014). Plam: A privacy-preserving framework for local-area mobile social networks. In INFOCOM, 2014 Proceedings IEEE, pages 763–771. IEEE.
5 Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. (2006). ldiversity: Privacy beyond k-anonymity. pages 24–24.
6 Niu, B., Gao, S., Li, F., Li, H., and Lu, Z. (2016). Protection of location privacy in continuous lbss against adversaries with background information. In 2016 International Conference on Computing, Networking and Communications (ICNC), pages 1–6.
7 Niu, B., Li, Q., Zhu, X., Cao, G., and Li, H. (2014). Achieving k-anonymity in privacyaware location-based services. In INFOCOM, 2014 Proceedings IEEE, pages 754– 762. IEEE.
8 Niu, B., Li, Q., Zhu, X., Cao, G., and Li, H. (2015). Enhancing privacy through caching in location-based services. In Computer Communications (INFOCOM), 2015 IEEE Conference on, pages 1017–1025. IEEE.
9 Serjantov, A. and Danezis, G. (2003). Towards an information theoretic metric for anonymity. In Dingledine, R. and Syverson, P., editors, Privacy Enhancing Technologies, pages 41–53, Berlin, Heidelberg. Springer Berlin Heidelberg.
10 Sun, G., Chang, V., Ramachandran, M., Sun, Z., Li, G., Yu, H., and Liao, D. (2017a). Efficient location privacy algorithm for internet of things (iot) services and applications. Journal of Network and Computer Applications, 89:3 – 13. Emerging Services for Internet of Things (IoT).
11 Sun, G., Liao, D., Li, H., Yu, H., and Chang, V. (2017b). L2p2: A location-label based approach for privacy preserving in lbs. Future Generation Computer Systems, 74:375 – 384.
12 Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557–570.
13 Tsoukaneri, G., Theodorakopoulos, G., Leather, H., and Marina, M. K. (2016). On the inference of user paths from anonymized mobility data. In 2016 IEEE European Symposium on Security and Privacy (EuroS P), pages 199–213.
14 Ullah, I. and Shah, M. A. (2016). A novel model for preserving location privacy in internet of things. In 2016 22nd International Conference on Automation and Computing (ICAC), pages 542–547.
15 Vu, K., Zheng, R., and Gao, J. (2012). Efficient algorithms for k-anonymous location privacy in participatory sensing. In 2012 Proceedings IEEE INFOCOM, pages 2399– 2407.
16 Ying, B. and Makrakis, D. (2014). Protecting location privacy with clustering anonymization in vehicular networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, pages 305–310. IEEE.
17 Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., and Li, H. (2013). Mobicache: When kanonymity meets cache. In Global Communications Conference (GLOBECOM), 2013 IEEE, pages 820–825. IEEE