The aim of this study was to identify and evaluate different de-identification techniques that may be used in several mobility-related use cases. To do so, four use cases have been defined in accordance with a project partner that focused on the legal aspects of this project, as well as with the VDA/FAT working group. Each use case aims to create different legal and technical issues with regards to the data and information that are to be gathered, used and transferred in the specific scenario. Use cases should therefore differ in the type and frequency of data that is gathered as well as the level of privacy and the speed of computation that is needed for the data. Upon identifying use cases, a systematic literature review has been performe...
A wide range of smart mobility technologies are being deployed within urban environment. These techn...
Mobility data are of fundamental importance for understanding the patterns of human movements, devel...
This paper analyzes both differential privacy and data de-identification. While differential privacy...
The aim of this study was to identify and evaluate different de-identification techniques that may b...
The recent advances in mobile computing and positioning technologies have resulted in a tremendous i...
Modern automobiles are no longer just mechanical tools. The electronics and computing services they ...
De-identification is the process of removing the associations between data and identifying elements ...
In the last years, our cars have seen a fast evolution with the application of big data, in particul...
Advancements in information and communication technologies (ICTs), e.g. smartphones, wearables, and ...
This report documents the program and the outcomes of Dagstuhl Seminar 12331 "Mobility Data Mining a...
Background: With the growing adoption of electronic medical records, there are increasing demands f...
In the last years we have witnessed a pervasive use of location-aware technologies such as vehicular...
Data is the new oil for the car industry. Cars generate data about how and where they are used and w...
In recent years, privacy management has become one of the most complex processes in the connected wo...
Throughout the ages, human beings prefer to keep most things secret and brand this overall state wit...
A wide range of smart mobility technologies are being deployed within urban environment. These techn...
Mobility data are of fundamental importance for understanding the patterns of human movements, devel...
This paper analyzes both differential privacy and data de-identification. While differential privacy...
The aim of this study was to identify and evaluate different de-identification techniques that may b...
The recent advances in mobile computing and positioning technologies have resulted in a tremendous i...
Modern automobiles are no longer just mechanical tools. The electronics and computing services they ...
De-identification is the process of removing the associations between data and identifying elements ...
In the last years, our cars have seen a fast evolution with the application of big data, in particul...
Advancements in information and communication technologies (ICTs), e.g. smartphones, wearables, and ...
This report documents the program and the outcomes of Dagstuhl Seminar 12331 "Mobility Data Mining a...
Background: With the growing adoption of electronic medical records, there are increasing demands f...
In the last years we have witnessed a pervasive use of location-aware technologies such as vehicular...
Data is the new oil for the car industry. Cars generate data about how and where they are used and w...
In recent years, privacy management has become one of the most complex processes in the connected wo...
Throughout the ages, human beings prefer to keep most things secret and brand this overall state wit...
A wide range of smart mobility technologies are being deployed within urban environment. These techn...
Mobility data are of fundamental importance for understanding the patterns of human movements, devel...
This paper analyzes both differential privacy and data de-identification. While differential privacy...