Anonymization: The imperfect science of using data while preserving privacy
Information about us, our actions, and our preferences is created at scale through surveys or
scientific studies or as a result of our interaction with digital devices such as smartphones …
scientific studies or as a result of our interaction with digital devices such as smartphones …
Indoor location based services challenges, requirements and usability of current solutions
Abstract Indoor Location Based Services (LBS), such as indoor navigation and tracking, still
have to deal with both technical and non-technical challenges. For this reason, they have …
have to deal with both technical and non-technical challenges. For this reason, they have …
Quantifying location privacy
It is a well-known fact that the progress of personal communication devices leads to serious
concerns about privacy in general, and location privacy in particular. As a response to these …
concerns about privacy in general, and location privacy in particular. As a response to these …
Protecting location privacy: optimal strategy against localization attacks
The mainstream approach to protecting the location-privacy of mobile users in location-
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
Optimal geo-indistinguishable mechanisms for location privacy
We consider the geo-indistinguishability approach to location privacy, and the trade-off with
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
How talkative is your mobile device? An experimental study of Wi-Fi probe requests
J Freudiger - Proceedings of the 8th ACM Conference on Security & …, 2015 - dl.acm.org
The IEEE 802.11 standard defines Wi-Fi probe requests as a active mechanism with which
mobile devices can request information from access points and accelerate the Wi-Fi …
mobile devices can request information from access points and accelerate the Wi-Fi …
Privacy in trajectory micro-data publishing: a survey
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …
information about the mobility of individuals, whose collection is becoming increasingly …
[HTML][HTML] De-anonymization attack on geolocated data
With the advent of GPS-equipped devices, a massive amount of location data is being
collected, raising the issue of the privacy risks incurred by the individuals whose movements …
collected, raising the issue of the privacy risks incurred by the individuals whose movements …
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the
design and evaluation of mobilee networks, such as large-scale urban sensing networks …
design and evaluation of mobilee networks, such as large-scale urban sensing networks …
Hiding in the mobile crowd: Locationprivacy through collaboration
Location-aware smartphones support various location-based services (LBSs): users query
the LBS server and learn on the fly about their surroundings. However, such queries give …
the LBS server and learn on the fly about their surroundings. However, such queries give …