Author:
Lee Gunhee,Chae Song-hwa,Hwang Inwhan,Hong Manpyo
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE Computer 35, 22–26 (2002)
2. Lecture Notes in Computer Science;L. Bussard,2002
3. Hengartner, U., Steenkiste, P.: Implementing Access Control to People Location Information. In: Proc. of SACMAT 2004, NewYork, USA, pp. 11–20 (2004)
4. Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy, CERCS Technical Reports, GIT-CERCS-04-15 (2004)
5. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)