-
European Union Directive on Privacy and Electronic Communications, 2002.
- M. Duckham and L. Kulik, Location Privacy and Location-aware Computing, Dyn. Mob. GIS Investig. Chang. Sp. time, vol. 3, pp. 35–51, 2006.
-
J. Krumm, Inference Attacks on Location Tracks, in Pervasive Computing. Springer, 2007, pp. 127-143.
-
M. A. Labrador, A. J. Perez, and P. Wightman. Location-based Information Systems: Developing Real-time Tracking Applications. Boca Raton: CRC Press, 2011.
-
M. Duckham and L. Kulik, A Formal Model of Obfuscation and Negotiation for Location Privacy, in Pervasive Computing. Springer, 2005, pp. 152-170.
-
P. Wightman, W. Coronell, D. Jabba, M. Jimeno, and M. Labrador, Evaluation of Location Obfuscation Techniques for Privacy in Location-based Information Systems, in Communications (LATINCOM), 2011 IEEE Latin-American Conference on, pp. 1-6.
-
P. Wightman, M. Zurbarán, E. Zurek, A. Salazar, D. Jabba, and M. Jimeno, θ-Rand: Random Noise-based Location Obfuscation Based on Circle Sectors, in IEEE International Symposium on Industrial Electronics and Applications (ISIEA) on, 2013.
-
P. Wightman, M. Zurbarán, and A. Santander, High Variability Geographical Obfuscation for Location Privacy, 2013 47th International Carnahan Conference on Security Technology (ICCST), Medellin, 2013, pp. 1-6.
-
A. Labrador, P. Wightman, A. Santander, D. Jabba, M. Jimeno, Tis-Bad: A Time Series-Based Deobfuscation Algorithm, in Investigación e Innovación en Ingenierías. Universidad Simón Bolívar. Vol. 3 (1), pp. 1 - 8. 2015.
-
A. Khoshgozaran, H. Shirani-Mehr, and C. Shahabi, SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy, in Mobile Data Management Workshops, 2008. MDMW 2008. Ninth International Conference on, pp. 55-62.
- F. Olumofin, P. K. Tysowski, I. Goldberg, and U. Hengartner, Achieving Efficient Query Privacy for Location-based Services, in Privacy Enhancing Technologies, 2010, pp. 93-110.
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, Private queries in location-based services: Anonymizers are not necessary, in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 121-132.
-
D. Quercia, I. Leontiadis, L. McNamara, C. Mascolo, and J. Crowcroft, SpotME if you can: Randomized Responses for Location Obfuscation on Mobile Phones, in Distributed Computing Systems (ICDCS), 2011 31st International Conference on, 2011, pp. 363-372.
-
H. Kido, Y. Yanagisawa, and T. Satoh, An Anonymous Communication Technique using Dummies for Location-based Services, in Pervasive Services, 2005. ICPS '05. Proceedings. International Conference on, pp. 88-97.
-
H. Lu, C. S. Jensen, and M. L. Yiu, Pad: Privacy-area aware, dummy-based location privacy in mobile services, in Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, pp. 16-23.
-
P. Shankar, V. Ganapathy, and L. Iftode (2009, September), Privately Querying Location-based Services with sybilquery. In Proceedings of the 11th international conference on Ubiquitous computing, 2009, pp. 31-40.
- P. M. Wightman, M. Zurbarán, M. Rodríguez, and M. A. Labrador, MaPIR: Mapping-based Private Information Retrieval for Location Privacy in LBISs, 38th Annual IEEE Conference on Local Computer Networks - Workshops, Sydney, NSW, 2013, pp. 964-971.