Abstract. Due to the popularity of mobile devices (e.g., cell phones, PDAs, etc.), location-based services have become more and more prevalent in recent years. However, users have to reveal their location information to ac-cess location-based services with existing service infrastructures. It is possible that adversaries could collect the location information, which in turn invades user’s privacy. There are existing solutions for query processing on spatial networks and mobile user privacy protection in Euclidean space. However there is no solution for solving queries on spatial networks with privacy protection. Therefore, we aim to provide network distance spatial query solutions which can preserve user privacy by utilizing K-anonymity mec...
UnrestrictedAn obvious requirement for evaluating spatial queries in Location Based Services (LBS) i...
University of Minnesota Ph.D. dissertation. May 2010. Major: Computer Science. Advisors: Dr. Mohamed...
Abstract Recently, several techniques have been proposed to protect the user location privacy for lo...
Abstract—In mobile communication, spatial queries pose a serious threat to user location privacy bec...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
Location-based applications are becoming increasingly popular due to the wide spread of global posit...
Location-based applications are becoming increasingly popular due to the wide spread of global posit...
The increasing trend of embedding positioning capabilities (for example, GPS) in mobile devices faci...
Abstract—The increasing trend of embedding positioning ca-pabilities (e.g., GPS) in mobile devices f...
Abstract—The increasing availability of location-aware mobile devices has given rise to a flurry of ...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
To protect users’ private locations in location-based services, various location anonymization techn...
In location-based services, users with location-aware mobile devices are able to make queries about ...
UnrestrictedAn obvious requirement for evaluating spatial queries in Location Based Services (LBS) i...
University of Minnesota Ph.D. dissertation. May 2010. Major: Computer Science. Advisors: Dr. Mohamed...
Abstract Recently, several techniques have been proposed to protect the user location privacy for lo...
Abstract—In mobile communication, spatial queries pose a serious threat to user location privacy bec...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
Location-based applications are becoming increasingly popular due to the wide spread of global posit...
Location-based applications are becoming increasingly popular due to the wide spread of global posit...
The increasing trend of embedding positioning capabilities (for example, GPS) in mobile devices faci...
Abstract—The increasing trend of embedding positioning ca-pabilities (e.g., GPS) in mobile devices f...
Abstract—The increasing availability of location-aware mobile devices has given rise to a flurry of ...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
In mobile communication, spatial queries pose a serious threat to user location privacy because the ...
To protect users’ private locations in location-based services, various location anonymization techn...
In location-based services, users with location-aware mobile devices are able to make queries about ...
UnrestrictedAn obvious requirement for evaluating spatial queries in Location Based Services (LBS) i...
University of Minnesota Ph.D. dissertation. May 2010. Major: Computer Science. Advisors: Dr. Mohamed...
Abstract Recently, several techniques have been proposed to protect the user location privacy for lo...