Publisher
Springer Science and Business Media LLC
Subject
Geography, Planning and Development,Information Systems
Reference47 articles.
1. Allard T, Nguyen B, Pucheral P (2014) METAP: Revisiting privacy-preserving data publishing using secure devices. Distributed and Parallel Databases 32(2):191–244
2. Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security. CCS ’13. ACM, New York, pp 901–914 , https://doi.org/10.1145/2508859.2516735
3. ARM (2009) ARM security technology - building a secure system using trustzone technology. ARM Technical White Paper
4. Baumann A, Peinado M, Hunt G (2014) Shielding applications from an untrusted cloud with haven. In: OSDI, pp 267–283
5. Brinkhoff T (2002) A framework for generating network-based moving objects. GeoInformatica 6(2):153–180
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献