2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2013
DOI: 10.1109/percomw.2013.6529496
|View full text |Cite
|
Sign up to set email alerts
|

Protecting location privacy with k-confusing paths based on dynamic pseudonyms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…We randomly define security requirements of up to five to randomly chosen users. We compare results with our safety verification program using the CSP solver with those using our previously developed polynomial-time algorithm [10]. Although the time complexity of the CSP solver is exponential at the worst case, our safety versifier outperforms our previously algorithm.…”
Section: Resultsmentioning
confidence: 99%
“…We randomly define security requirements of up to five to randomly chosen users. We compare results with our safety verification program using the CSP solver with those using our previously developed polynomial-time algorithm [10]. Although the time complexity of the CSP solver is exponential at the worst case, our safety versifier outperforms our previously algorithm.…”
Section: Resultsmentioning
confidence: 99%