SUTC   2008 Ubiquitous Sensor Networks
Wall of Fame | Most Viewed SUTC-2008 Paper
13 years 6 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source217
2Download preprint from source191
3Download preprint from source171
4Download preprint from source153
5Download preprint from source151
6Download preprint from source138
7Download preprint from source135
8Download preprint from source132
9Download preprint from source130
10Download preprint from source130
11Download preprint from source129
12Download preprint from source127
13Download preprint from source106
14Download preprint from source100
15Download preprint from source100
16Download preprint from source98
17Download preprint from source96
18Download preprint from source68