Pseudonym schemes in vehicular networks: A survey

J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2014‏ - ieeexplore.ieee.org
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

Does -Anonymous Microaggregation Affect Machine-Learned Macrotrends?

A Rodriguez-Hoyos, J Estrada-Jiménez… - IEEE …, 2018‏ - ieeexplore.ieee.org
In the era of big data, the availability of massive amounts of information makes privacy
protection more necessary than ever. Among a variety of anonymization mechanisms …

Pay-per-tracking: A collaborative masking model for web browsing

J Parra-Arnau - Information Sciences, 2017‏ - Elsevier
Web tracking is the key enabling technology of modern online advertising and, at the same
time, the source of serious privacy concerns. In recent years, we have witnessed the …

The fast maximum distance to average vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data

A Rodríguez-Hoyos, J Estrada-Jiménez… - … Applications of Artificial …, 2020‏ - Elsevier
The massive exploitation of tons of data is currently guiding critical decisions in domains
such as economics or health. But serious privacy risks arise since personal data is …

Reconciling privacy and efficient utility management in smart cities

D Rebollo‐Monedero, A Bartoli… - Transactions on …, 2014‏ - Wiley Online Library
ABSTRACT A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient
management of utilities, enabled by technologies such as those entailing smart metering of …

p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation

D Rebollo-Monedero, J Forné, M Soriano… - Information Sciences, 2017‏ - Elsevier
We develop a probabilistic variant of k-anonymous microaggregation which we term p-
probabilistic resorting to a statistical model of respondent participation in order to aggregate …

Protecting query privacy in location-based services

X Chen, J Pang - GeoInformatica, 2014‏ - Springer
The popularity of location-based services (LBSs) leads to severe concerns on users' privacy.
With the fast growth of Internet applications such as online social networks, more user …

[HTML][HTML] Entropy-based privacy against profiling of user mobility

A Rodriguez-Carrion, D Rebollo-Monedero, J Forné… - Entropy, 2015‏ - mdpi.com
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an
evident privacy risk. The locations accompanying the LBS queries can be exploited by the …

A survey on measuring anonymity in anonymous communication systems

T Lu, Z Du, ZJ Wang - IEEE Access, 2019‏ - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …

-Inference: A Data-Aware and High-Utility Privacy Model for Relational Data Publishing

Z Chen, L Yao, H Hu, G Wu - IEEE Transactions on …, 2025‏ - ieeexplore.ieee.org
Current privacy-preservation data publishing technologies primarily focus on anonymizing
datasets, often overlooking the inherent privacy degrees embedded within the data. This …