Author:
Duckham Matt,Kulik Lars,Birtley Athol
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)
2. Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (2001)
3. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation Onion router. In: Proc. 13th USENIX Security Symposium (2004)
4. Lecture Notes in Computer Science;M. Duckham,2005
5. Lecture Notes in Computer Science;M. Duckham,2005
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Activity-based Mobility Profiling;Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18;2018
2. Location-Based Services;Encyclopedia of Database Systems;2018
3. Maintaining anonymity using -privacy;Journal of Location Based Services;2017-01-02
4. Location-Based Services;Encyclopedia of Database Systems;2016
5. Spatio-Temporal Architecture-Based Framework for Testing Services in the Cloud;Proceedings of the ASWEC 2015 24th Australasian Software Engineering Conference;2015-09-28