Pseudonym schemes in vehicular networks: A survey

J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2014 - ieeexplore.ieee.org
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey

JW Kim, K Edemacu, B Jang - Journal of Network and Computer …, 2022 - Elsevier
With the advancement in communication techniques and sensor technologies, mobile
crowdsensing (MCS)—one of the most successful applications of crowdsourcing—has …

Quantifying location privacy

R Shokri, G Theodorakopoulos… - … IEEE symposium on …, 2011 - ieeexplore.ieee.org
It is a well-known fact that the progress of personal communication devices leads to serious
concerns about privacy in general, and location privacy in particular. As a response to these …

Evaluation of traffic data obtained via GPS-enabled mobile phones: The Mobile Century field experiment

JC Herrera, DB Work, R Herring, XJ Ban… - … Research Part C …, 2010 - Elsevier
The growing need of the driving public for accurate traffic information has spurred the
deployment of large scale dedicated monitoring infrastructure systems, which mainly consist …

Protecting location privacy: optimal strategy against localization attacks

R Shokri, G Theodorakopoulos, C Troncoso… - Proceedings of the …, 2012 - dl.acm.org
The mainstream approach to protecting the location-privacy of mobile users in location-
based services (LBSs) is to alter the users' actual locations in order to reduce the location …

Vtrack: accurate, energy-aware road traffic delay estimation using mobile phones

A Thiagarajan, L Ravindranath, K LaCurts… - Proceedings of the 7th …, 2009 - dl.acm.org
Traffic delays and congestion are a major source of inefficiency, wasted fuel, and commuter
frustration. Measuring and localizing these delays, and routing users around them, is an …

Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors

Z Xu, K Bai, S Zhu - Proceedings of the fifth ACM conference on Security …, 2012 - dl.acm.org
Today's smartphones are shipped with various embedded motion sensors, such as the
accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in …

A survey of computational location privacy

J Krumm - Personal and Ubiquitous Computing, 2009 - Springer
This is a literature survey of computational location privacy, meaning computation-based
privacy mechanisms that treat location data as geometric information. This definition …

Inference attacks on location tracks

J Krumm - … Conference, PERVASIVE 2007, Toronto, Canada, May …, 2007 - Springer
Although the privacy threats and countermeasures associated with location data are well
known, there has not been a thorough experiment to assess the effectiveness of either. We …

Signalguru: leveraging mobile phones for collaborative traffic signal schedule advisory

E Koukoumidis, LS Peh, MR Martonosi - Proceedings of the 9th …, 2011 - dl.acm.org
While traffic signals are necessary to safely control competing flows of traffic, they inevitably
enforce a stop-and-go movement pattern that increases fuel consumption, reduces traffic …