The International Series in Engineering and Computer Science
DOI: 10.1007/0-387-23462-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Location Privacy in Pervasive Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 17 publications
0
12
0
1
Order By: Relevance
“…Görlach et al [14] suggests that users can hinder RF-based localization techniques by distributing their data on pseudo-randomly chosen channel. An attacker would then be less able to distinguish, and thus localize, signals transmitted in this way.…”
Section: Network-level Location Privacymentioning
confidence: 99%
“…Görlach et al [14] suggests that users can hinder RF-based localization techniques by distributing their data on pseudo-randomly chosen channel. An attacker would then be less able to distinguish, and thus localize, signals transmitted in this way.…”
Section: Network-level Location Privacymentioning
confidence: 99%
“…The privacy protection technology is divided into three categories [2]: a) Based on data distortion technology: the method that distorts the sensitive data while maintaining some of data or data attributes unchanged. For example, use technologies such as adding noise, swapping etc in the primitive data processing disturbance, and meanwhile ensure that the processed data can still maintain some statistical aspects of nature for data mining and other operations.…”
Section: A the Classification Of Privacy Protection Technologymentioning
confidence: 99%
“…A variety of policy-driven approaches to location privacy in pervasive systems are reviewed in [10]. Much of this research draws on established or developing privacy policy frameworks, such as the W3C Platform for Privacy Preferences (P3P; e.g., [29,20,22]), the IETF draft geographic location privacy charter (GeoPriv; e.g., [24]), and personal digital rights management (PDRM, e.g., [13]).…”
Section: Privacy Policiesmentioning
confidence: 99%