Author:
Mayrhofer Rene,Sommer Alexander,Saral Sinan
Subject
General Computer Science,Theoretical Computer Science
Reference9 articles.
1. Rover: scalable location-aware computing
2. Brush, A.J.B., Krumm, J. and Scott, J. (2010), “Exploring end user preferences for location obfuscation, location‐based services, and the value of location”,Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Copenhagen, pp. 95‐104.
3. E-graffiti: evaluating real-world use of a context-aware system
4. Dingledine, R., Mathewson, N. and Syverson, P. (2004), “Tor: the second‐generation onion router”,13th USENIX Security Symposium, pp. 303‐20.
5. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Intelligent Agents;Perceptions of Knowledge Visualization;2014