The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services (English)
- New search for: Ashouri-Talouki, Maede
- New search for: Baraani-Dastjerdi, Ahmad
- New search for: Selçuk, Ali Aydın
- New search for: Ashouri-Talouki, Maede
- New search for: Baraani-Dastjerdi, Ahmad
- New search for: Selçuk, Ali Aydın
In:
Knowledge and Information Systems
;
45
, 3
; 589-615
;
2014
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
-
Contributors:Ashouri-Talouki, Maede ( author ) / Baraani-Dastjerdi, Ahmad ( author ) / Selçuk, Ali Aydın ( author )
-
Published in:Knowledge and Information Systems ; 45, 3 ; 589-615
-
Publisher:
- New search for: Springer London
- New search for: Springer
-
Place of publication:London
-
Publication date:2014
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 06.74 / 54.64$jDatenbanken / 06.74$jInformationssysteme / 54.64
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 06.74 Informationssysteme / 54.64$jDatenbanken / 06.74$jInformationssysteme / 54.64 Datenbanken -
Source:
Table of contents – Volume 45, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 535
-
A survey on data stream clustering and classificationNguyen, Hai-Long / Woon, Yew-Kwong / Ng, Wee-Keong et al. | 2014
- 571
-
On the anonymizability of graphsAggarwal, Charu C. / Li, Yao / Yu, Philip S. et al. | 2014
- 589
-
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based servicesAshouri-Talouki, Maede / Baraani-Dastjerdi, Ahmad / Selçuk, Ali Aydın et al. | 2014
- 617
-
Triangle minimization in large networksLi, Rong-Hua / Yu, Jeffrey Xu et al. | 2014
- 645
-
Estimating robustness in large social graphsMalliaros, Fragkiskos D. / Megalooikonomou, Vasileios / Faloutsos, Christos et al. | 2014
- 679
-
Optimal WCDMA network planning by multiobjective evolutionary algorithm with problem-specific genetic operationGu, Fangqing / Liu, Hai-lin / Cheung, Yiu-Ming / Xie, Shengli et al. | 2014
- 705
-
The Mask of ZoRRo: preventing information leakage from documentsDeshpande, Prasad M. / Joshi, Salil / Dewan, Prateek / Murthy, Karin / Mohania, Mukesh / Agrawal, Sheshnarayan et al. | 2014
- 731
-
Mining sequential patterns for classificationFradkin, Dmitriy / Mörchen, Fabian et al. | 2015
- 751
-
Evaluating link prediction methodsYang, Yang / Lichtenwalter, Ryan N. / Chawla, Nitesh V. et al. | 2014
- 783
-
Multiplicative distance: a method to alleviate distance instability for high-dimensional dataMansouri, Jafar / Khademi, Morteza et al. | 2014