Pseudonym schemes in vehicular networks: A survey
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
and messages. Yet, privacy of individual vehicles and drivers must be maintained …
Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey
With the advancement in communication techniques and sensor technologies, mobile
crowdsensing (MCS)—one of the most successful applications of crowdsourcing—has …
crowdsensing (MCS)—one of the most successful applications of crowdsourcing—has …
Quantifying location privacy
It is a well-known fact that the progress of personal communication devices leads to serious
concerns about privacy in general, and location privacy in particular. As a response to these …
concerns about privacy in general, and location privacy in particular. As a response to these …
Evaluation of traffic data obtained via GPS-enabled mobile phones: The Mobile Century field experiment
The growing need of the driving public for accurate traffic information has spurred the
deployment of large scale dedicated monitoring infrastructure systems, which mainly consist …
deployment of large scale dedicated monitoring infrastructure systems, which mainly consist …
Protecting location privacy: optimal strategy against localization attacks
The mainstream approach to protecting the location-privacy of mobile users in location-
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
Vtrack: accurate, energy-aware road traffic delay estimation using mobile phones
A Thiagarajan, L Ravindranath, K LaCurts… - Proceedings of the 7th …, 2009 - dl.acm.org
Traffic delays and congestion are a major source of inefficiency, wasted fuel, and commuter
frustration. Measuring and localizing these delays, and routing users around them, is an …
frustration. Measuring and localizing these delays, and routing users around them, is an …
Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors
Today's smartphones are shipped with various embedded motion sensors, such as the
accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in …
accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in …
A survey of computational location privacy
J Krumm - Personal and Ubiquitous Computing, 2009 - Springer
This is a literature survey of computational location privacy, meaning computation-based
privacy mechanisms that treat location data as geometric information. This definition …
privacy mechanisms that treat location data as geometric information. This definition …
Inference attacks on location tracks
J Krumm - … Conference, PERVASIVE 2007, Toronto, Canada, May …, 2007 - Springer
Although the privacy threats and countermeasures associated with location data are well
known, there has not been a thorough experiment to assess the effectiveness of either. We …
known, there has not been a thorough experiment to assess the effectiveness of either. We …
Signalguru: leveraging mobile phones for collaborative traffic signal schedule advisory
While traffic signals are necessary to safely control competing flows of traffic, they inevitably
enforce a stop-and-go movement pattern that increases fuel consumption, reduces traffic …
enforce a stop-and-go movement pattern that increases fuel consumption, reduces traffic …