Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Location Privacy). Showing records 1 – 30 of 96 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Levels

Country

▼ Search Limiters

1. L. Bertolaja. LOCATION SHARING: PRIVACY THREATS AND PROTECTION.

Degree: 2015, Università degli Studi di Milano

 In recent years there has been a growing increase in the number of users that use smartphones,tablets, wearable technologies and other devices that users have… (more)

Subjects/Keywords: location privacy; location sharing; privacy threats; privacy protection techniques; Settore INF/01 - Informatica

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bertolaja, L. (2015). LOCATION SHARING: PRIVACY THREATS AND PROTECTION. (Thesis). Università degli Studi di Milano. Retrieved from http://hdl.handle.net/2434/265334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bertolaja, L.. “LOCATION SHARING: PRIVACY THREATS AND PROTECTION.” 2015. Thesis, Università degli Studi di Milano. Accessed January 26, 2020. http://hdl.handle.net/2434/265334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bertolaja, L.. “LOCATION SHARING: PRIVACY THREATS AND PROTECTION.” 2015. Web. 26 Jan 2020.

Vancouver:

Bertolaja L. LOCATION SHARING: PRIVACY THREATS AND PROTECTION. [Internet] [Thesis]. Università degli Studi di Milano; 2015. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/2434/265334.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bertolaja L. LOCATION SHARING: PRIVACY THREATS AND PROTECTION. [Thesis]. Università degli Studi di Milano; 2015. Available from: http://hdl.handle.net/2434/265334

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

2. Tsai, Janice Y. The Impact of Salient Privacy Information on Decision-Making.

Degree: 2009, Carnegie Mellon University

 People value their privacy; however, they typically do not make the protection of their privacy a priority. Privacy is oftentimes not tangible, complicating the efforts… (more)

Subjects/Keywords: Privacy; Online Privacy; Mobile-Location Privacy; Technology Adoption; Behavioral Economics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, J. Y. (2009). The Impact of Salient Privacy Information on Decision-Making. (Thesis). Carnegie Mellon University. Retrieved from http://repository.cmu.edu/dissertations/1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Janice Y. “The Impact of Salient Privacy Information on Decision-Making.” 2009. Thesis, Carnegie Mellon University. Accessed January 26, 2020. http://repository.cmu.edu/dissertations/1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Janice Y. “The Impact of Salient Privacy Information on Decision-Making.” 2009. Web. 26 Jan 2020.

Vancouver:

Tsai JY. The Impact of Salient Privacy Information on Decision-Making. [Internet] [Thesis]. Carnegie Mellon University; 2009. [cited 2020 Jan 26]. Available from: http://repository.cmu.edu/dissertations/1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai JY. The Impact of Salient Privacy Information on Decision-Making. [Thesis]. Carnegie Mellon University; 2009. Available from: http://repository.cmu.edu/dissertations/1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Alberta

3. Vogt, Ryan A. Human Mobility and Location Privacy in Wireless Sensor Networks.

Degree: PhD, Department of Computing Science, 2014, University of Alberta

 By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's current location and his/her location of interest. Issuing… (more)

Subjects/Keywords: networks; human mobility; location privacy; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vogt, R. A. (2014). Human Mobility and Location Privacy in Wireless Sensor Networks. (Doctoral Dissertation). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/6h440t39c

Chicago Manual of Style (16th Edition):

Vogt, Ryan A. “Human Mobility and Location Privacy in Wireless Sensor Networks.” 2014. Doctoral Dissertation, University of Alberta. Accessed January 26, 2020. https://era.library.ualberta.ca/files/6h440t39c.

MLA Handbook (7th Edition):

Vogt, Ryan A. “Human Mobility and Location Privacy in Wireless Sensor Networks.” 2014. Web. 26 Jan 2020.

Vancouver:

Vogt RA. Human Mobility and Location Privacy in Wireless Sensor Networks. [Internet] [Doctoral dissertation]. University of Alberta; 2014. [cited 2020 Jan 26]. Available from: https://era.library.ualberta.ca/files/6h440t39c.

Council of Science Editors:

Vogt RA. Human Mobility and Location Privacy in Wireless Sensor Networks. [Doctoral Dissertation]. University of Alberta; 2014. Available from: https://era.library.ualberta.ca/files/6h440t39c


University of Arkansas

4. Moccaro, Matthew Francis. Mobile Banking Security Using GPS and LDPC Codes.

Degree: MSCmpE, 2014, University of Arkansas

  Mobile Banking is becoming a major part of our world's financial system. Being able to manage one's finances on a mobile device can provide… (more)

Subjects/Keywords: Banking; Location; Mobile; Privacy; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moccaro, M. F. (2014). Mobile Banking Security Using GPS and LDPC Codes. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2314

Chicago Manual of Style (16th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Masters Thesis, University of Arkansas. Accessed January 26, 2020. https://scholarworks.uark.edu/etd/2314.

MLA Handbook (7th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Web. 26 Jan 2020.

Vancouver:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Internet] [Masters thesis]. University of Arkansas; 2014. [cited 2020 Jan 26]. Available from: https://scholarworks.uark.edu/etd/2314.

Council of Science Editors:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Masters Thesis]. University of Arkansas; 2014. Available from: https://scholarworks.uark.edu/etd/2314


University of Ottawa

5. Huang, Rui. Providing Location-Privacy in Opportunistic Mobile Social Networks .

Degree: 2018, University of Ottawa

 Users face location-privacy risks when accessing Location-Based Services (LBSs) in an Opportunistic Mobile Social Networks (OMSNs). In order to protect the original requester's identity and… (more)

Subjects/Keywords: Location-privacy; Opportunistic mobile social networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, R. (2018). Providing Location-Privacy in Opportunistic Mobile Social Networks . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/37353

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Rui. “Providing Location-Privacy in Opportunistic Mobile Social Networks .” 2018. Thesis, University of Ottawa. Accessed January 26, 2020. http://hdl.handle.net/10393/37353.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Rui. “Providing Location-Privacy in Opportunistic Mobile Social Networks .” 2018. Web. 26 Jan 2020.

Vancouver:

Huang R. Providing Location-Privacy in Opportunistic Mobile Social Networks . [Internet] [Thesis]. University of Ottawa; 2018. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/10393/37353.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang R. Providing Location-Privacy in Opportunistic Mobile Social Networks . [Thesis]. University of Ottawa; 2018. Available from: http://hdl.handle.net/10393/37353

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Melbourne

6. SENEVIRATNE, JANAKA. Location proof architectures.

Degree: 2014, University of Melbourne

 Upcoming location based services such as pay-as-you-drive insurances mandate verified locations. To enable such services Location Proof Architectures (LPAs) have been proposed in literature to… (more)

Subjects/Keywords: location proof; architecture; security; privacy; pseudonym

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

SENEVIRATNE, J. (2014). Location proof architectures. (Masters Thesis). University of Melbourne. Retrieved from http://hdl.handle.net/11343/48399

Chicago Manual of Style (16th Edition):

SENEVIRATNE, JANAKA. “Location proof architectures.” 2014. Masters Thesis, University of Melbourne. Accessed January 26, 2020. http://hdl.handle.net/11343/48399.

MLA Handbook (7th Edition):

SENEVIRATNE, JANAKA. “Location proof architectures.” 2014. Web. 26 Jan 2020.

Vancouver:

SENEVIRATNE J. Location proof architectures. [Internet] [Masters thesis]. University of Melbourne; 2014. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/11343/48399.

Council of Science Editors:

SENEVIRATNE J. Location proof architectures. [Masters Thesis]. University of Melbourne; 2014. Available from: http://hdl.handle.net/11343/48399

7. Liu, Peiyuan. Quantifying Location Privacy In Location-based Services.

Degree: 2018, University of Waterloo

 Mobile devices (e.g., smart phones) are widely used in people's daily lives. When users rely on location-based services in mobile applications, plenty of location records… (more)

Subjects/Keywords: location privacy

…List of Figures 3.1 Location Privacy Framework… …causes a severe location privacy threat. Considering that an external attacker may find a way… …real time. The location privacy problem for location-based services in mobile devices has… …drawn much attention [WSDR14]. To protect users’ location privacy, a useful strategy… …LBS when protecting their location privacy. The mechanisms to generate such noise are called… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, P. (2018). Quantifying Location Privacy In Location-based Services. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14061

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Peiyuan. “Quantifying Location Privacy In Location-based Services.” 2018. Thesis, University of Waterloo. Accessed January 26, 2020. http://hdl.handle.net/10012/14061.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Peiyuan. “Quantifying Location Privacy In Location-based Services.” 2018. Web. 26 Jan 2020.

Vancouver:

Liu P. Quantifying Location Privacy In Location-based Services. [Internet] [Thesis]. University of Waterloo; 2018. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/10012/14061.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu P. Quantifying Location Privacy In Location-based Services. [Thesis]. University of Waterloo; 2018. Available from: http://hdl.handle.net/10012/14061

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

8. Vishwanathan, Roopa. Exploring Privacy in Location-based Services Using Cryptographic Protocols.

Degree: 2011, University of North Texas

Location-based services (LBS) are available on a variety of mobile platforms like cell phones, PDA's, etc. and an increasing number of users subscribe to and… (more)

Subjects/Keywords: Cryptographic protocols; privacy; location-based services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vishwanathan, R. (2011). Exploring Privacy in Location-based Services Using Cryptographic Protocols. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc68060/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vishwanathan, Roopa. “Exploring Privacy in Location-based Services Using Cryptographic Protocols.” 2011. Thesis, University of North Texas. Accessed January 26, 2020. https://digital.library.unt.edu/ark:/67531/metadc68060/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vishwanathan, Roopa. “Exploring Privacy in Location-based Services Using Cryptographic Protocols.” 2011. Web. 26 Jan 2020.

Vancouver:

Vishwanathan R. Exploring Privacy in Location-based Services Using Cryptographic Protocols. [Internet] [Thesis]. University of North Texas; 2011. [cited 2020 Jan 26]. Available from: https://digital.library.unt.edu/ark:/67531/metadc68060/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vishwanathan R. Exploring Privacy in Location-based Services Using Cryptographic Protocols. [Thesis]. University of North Texas; 2011. Available from: https://digital.library.unt.edu/ark:/67531/metadc68060/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

9. Rafferty, Laura. A location privacy model and framework for mobile toy computing.

Degree: 2015, University of Ontario Institute of Technology

 Many toys on the market are becoming integrated with the sensory and networking capabilities of mobile technology. Toy computing is an emerging area of research… (more)

Subjects/Keywords: Privacy; Mobile services; Toy computing; Location privacy; BYOD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rafferty, L. (2015). A location privacy model and framework for mobile toy computing. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rafferty, Laura. “A location privacy model and framework for mobile toy computing.” 2015. Thesis, University of Ontario Institute of Technology. Accessed January 26, 2020. http://hdl.handle.net/10155/544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rafferty, Laura. “A location privacy model and framework for mobile toy computing.” 2015. Web. 26 Jan 2020.

Vancouver:

Rafferty L. A location privacy model and framework for mobile toy computing. [Internet] [Thesis]. University of Ontario Institute of Technology; 2015. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/10155/544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rafferty L. A location privacy model and framework for mobile toy computing. [Thesis]. University of Ontario Institute of Technology; 2015. Available from: http://hdl.handle.net/10155/544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Bridgeport

10. Bushnag, Anas. Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections .

Degree: 2018, University of Bridgeport

 Wireless Sensor Networks WSNs have been utilized for many applications such as tracking and monitoring of endangered species in a national park, soldiers in a… (more)

Subjects/Keywords: Anonymity; Network; Privacy; Security; Source location privacy; Wireless sensor networks (WSN)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bushnag, A. (2018). Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections . (Thesis). University of Bridgeport. Retrieved from https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bushnag, Anas. “Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections .” 2018. Thesis, University of Bridgeport. Accessed January 26, 2020. https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bushnag, Anas. “Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections .” 2018. Web. 26 Jan 2020.

Vancouver:

Bushnag A. Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections . [Internet] [Thesis]. University of Bridgeport; 2018. [cited 2020 Jan 26]. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bushnag A. Optimizing Source Anonymity Of Wireless Sensor Networks Against Global Adversary Using Fake Packet Injections . [Thesis]. University of Bridgeport; 2018. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/2005

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

11. Rosenberg, Dale Patrick. The value required to negate consumer privacy concerns around location.

Degree: Gordon Institute of Business Science (GIBS), 2013, University of Pretoria

Privacy has been discussed throughout the ages as the world has developed and changed however privacy concerns have been reignited by the development of technology.… (more)

Subjects/Keywords: UCTD; Mobile commerce; Privacy; Location based services; Privacy calculus

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rosenberg, D. (2013). The value required to negate consumer privacy concerns around location. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/27021

Chicago Manual of Style (16th Edition):

Rosenberg, Dale. “The value required to negate consumer privacy concerns around location.” 2013. Masters Thesis, University of Pretoria. Accessed January 26, 2020. http://hdl.handle.net/2263/27021.

MLA Handbook (7th Edition):

Rosenberg, Dale. “The value required to negate consumer privacy concerns around location.” 2013. Web. 26 Jan 2020.

Vancouver:

Rosenberg D. The value required to negate consumer privacy concerns around location. [Internet] [Masters thesis]. University of Pretoria; 2013. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/2263/27021.

Council of Science Editors:

Rosenberg D. The value required to negate consumer privacy concerns around location. [Masters Thesis]. University of Pretoria; 2013. Available from: http://hdl.handle.net/2263/27021


University of Pretoria

12. [No author]. The value required to negate consumer privacy concerns around location .

Degree: 2013, University of Pretoria

Privacy has been discussed throughout the ages as the world has developed and changed however privacy concerns have been reignited by the development of technology.… (more)

Subjects/Keywords: UCTD; Mobile commerce; Privacy; Location based services; Privacy calculus

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2013). The value required to negate consumer privacy concerns around location . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-08042012-185607/

Chicago Manual of Style (16th Edition):

author], [No. “The value required to negate consumer privacy concerns around location .” 2013. Masters Thesis, University of Pretoria. Accessed January 26, 2020. http://upetd.up.ac.za/thesis/available/etd-08042012-185607/.

MLA Handbook (7th Edition):

author], [No. “The value required to negate consumer privacy concerns around location .” 2013. Web. 26 Jan 2020.

Vancouver:

author] [. The value required to negate consumer privacy concerns around location . [Internet] [Masters thesis]. University of Pretoria; 2013. [cited 2020 Jan 26]. Available from: http://upetd.up.ac.za/thesis/available/etd-08042012-185607/.

Council of Science Editors:

author] [. The value required to negate consumer privacy concerns around location . [Masters Thesis]. University of Pretoria; 2013. Available from: http://upetd.up.ac.za/thesis/available/etd-08042012-185607/


Universiteit Utrecht

13. Schepers, J. Checking in & creeping out? Een discoursanalyse naar locatiegebaseerde diensten en privacy.

Degree: 2015, Universiteit Utrecht

 Aan de hand van een kritische discoursanalyse volgens de principes van Norman Fairclough (o.a.1992), wordt onderzocht hoe er op technologieblog Wired invulling wordt gegeven aan… (more)

Subjects/Keywords: location-based services; privacy; sociale en institionele locational privacy; kritische discoursanalyse

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schepers, J. (2015). Checking in & creeping out? Een discoursanalyse naar locatiegebaseerde diensten en privacy. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/313863

Chicago Manual of Style (16th Edition):

Schepers, J. “Checking in & creeping out? Een discoursanalyse naar locatiegebaseerde diensten en privacy.” 2015. Masters Thesis, Universiteit Utrecht. Accessed January 26, 2020. http://dspace.library.uu.nl:8080/handle/1874/313863.

MLA Handbook (7th Edition):

Schepers, J. “Checking in & creeping out? Een discoursanalyse naar locatiegebaseerde diensten en privacy.” 2015. Web. 26 Jan 2020.

Vancouver:

Schepers J. Checking in & creeping out? Een discoursanalyse naar locatiegebaseerde diensten en privacy. [Internet] [Masters thesis]. Universiteit Utrecht; 2015. [cited 2020 Jan 26]. Available from: http://dspace.library.uu.nl:8080/handle/1874/313863.

Council of Science Editors:

Schepers J. Checking in & creeping out? Een discoursanalyse naar locatiegebaseerde diensten en privacy. [Masters Thesis]. Universiteit Utrecht; 2015. Available from: http://dspace.library.uu.nl:8080/handle/1874/313863


Wayne State University

14. Xi, Yong. Location Privacy In Emerging Network-Based Applications.

Degree: PhD, Computer Science, 2012, Wayne State University

  With the wide spread of computer systems and networks, privacy has become an issue that increasingly attracts attention. In wireless sensor networks, the location(more)

Subjects/Keywords: Anonymity; Location Privacy; Privacy; Sensor Network; Shortest Path Routing; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xi, Y. (2012). Location Privacy In Emerging Network-Based Applications. (Doctoral Dissertation). Wayne State University. Retrieved from https://digitalcommons.wayne.edu/oa_dissertations/626

Chicago Manual of Style (16th Edition):

Xi, Yong. “Location Privacy In Emerging Network-Based Applications.” 2012. Doctoral Dissertation, Wayne State University. Accessed January 26, 2020. https://digitalcommons.wayne.edu/oa_dissertations/626.

MLA Handbook (7th Edition):

Xi, Yong. “Location Privacy In Emerging Network-Based Applications.” 2012. Web. 26 Jan 2020.

Vancouver:

Xi Y. Location Privacy In Emerging Network-Based Applications. [Internet] [Doctoral dissertation]. Wayne State University; 2012. [cited 2020 Jan 26]. Available from: https://digitalcommons.wayne.edu/oa_dissertations/626.

Council of Science Editors:

Xi Y. Location Privacy In Emerging Network-Based Applications. [Doctoral Dissertation]. Wayne State University; 2012. Available from: https://digitalcommons.wayne.edu/oa_dissertations/626


Iowa State University

15. Galdames-Sepulveda, Patricio A. Novel techniques for location-cloaked applications.

Degree: 2012, Iowa State University

Location cloaking has been shown to be cost-effective in mitigating location privacy and safety risks. This strategy, however, has significant impact on the applications that… (more)

Subjects/Keywords: Location Based Services; Location-cloaked Queries; Location Privacy; Location Safety; Location Verification; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Galdames-Sepulveda, P. A. (2012). Novel techniques for location-cloaked applications. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/12875

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Galdames-Sepulveda, Patricio A. “Novel techniques for location-cloaked applications.” 2012. Thesis, Iowa State University. Accessed January 26, 2020. https://lib.dr.iastate.edu/etd/12875.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Galdames-Sepulveda, Patricio A. “Novel techniques for location-cloaked applications.” 2012. Web. 26 Jan 2020.

Vancouver:

Galdames-Sepulveda PA. Novel techniques for location-cloaked applications. [Internet] [Thesis]. Iowa State University; 2012. [cited 2020 Jan 26]. Available from: https://lib.dr.iastate.edu/etd/12875.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Galdames-Sepulveda PA. Novel techniques for location-cloaked applications. [Thesis]. Iowa State University; 2012. Available from: https://lib.dr.iastate.edu/etd/12875

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cornell University

16. Karlsson, Kolbeinn. Design and Analysis of Privacy Mechanisms for the Internet of Things .

Degree: 2018, Cornell University

 The trend toward embedding internet-connected computers in objects and buildings is often referred to as the Internet of Things (IoT). The IoT has great potential… (more)

Subjects/Keywords: Applied mathematics; Adblocking; Differential Privacy; Location privacy; Privacy; Electrical engineering; blockchain; Computer engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karlsson, K. (2018). Design and Analysis of Privacy Mechanisms for the Internet of Things . (Thesis). Cornell University. Retrieved from http://hdl.handle.net/1813/59654

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Karlsson, Kolbeinn. “Design and Analysis of Privacy Mechanisms for the Internet of Things .” 2018. Thesis, Cornell University. Accessed January 26, 2020. http://hdl.handle.net/1813/59654.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Karlsson, Kolbeinn. “Design and Analysis of Privacy Mechanisms for the Internet of Things .” 2018. Web. 26 Jan 2020.

Vancouver:

Karlsson K. Design and Analysis of Privacy Mechanisms for the Internet of Things . [Internet] [Thesis]. Cornell University; 2018. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/1813/59654.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Karlsson K. Design and Analysis of Privacy Mechanisms for the Internet of Things . [Thesis]. Cornell University; 2018. Available from: http://hdl.handle.net/1813/59654

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Montazeri, Zarrin. Achieving Perfect Location Privacy in Wireless Devices Using Anonymization.

Degree: 2017, University of Massachusetts

  The popularity of mobile devices and location-based services (LBS) have created great concerns regarding the location privacy of the users of such devices and… (more)

Subjects/Keywords: Location Privacy; Perfect Location Privacy; Location Based Services; Mutual Information; Markov Chain; Wireless device; Computer Engineering; Computer Sciences; Engineering; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Montazeri, Z. (2017). Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. (Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/masters_theses_2/478

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Montazeri, Zarrin. “Achieving Perfect Location Privacy in Wireless Devices Using Anonymization.” 2017. Thesis, University of Massachusetts. Accessed January 26, 2020. https://scholarworks.umass.edu/masters_theses_2/478.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Montazeri, Zarrin. “Achieving Perfect Location Privacy in Wireless Devices Using Anonymization.” 2017. Web. 26 Jan 2020.

Vancouver:

Montazeri Z. Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. [Internet] [Thesis]. University of Massachusetts; 2017. [cited 2020 Jan 26]. Available from: https://scholarworks.umass.edu/masters_theses_2/478.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Montazeri Z. Achieving Perfect Location Privacy in Wireless Devices Using Anonymization. [Thesis]. University of Massachusetts; 2017. Available from: https://scholarworks.umass.edu/masters_theses_2/478

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Bridgeport

18. Abuzneid, Abdelshakour A. Fortified End-to-End Location Privacy and Anonymity in Wireless Sensor Networks: a Modular Approach .

Degree: 2015, University of Bridgeport

 Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent… (more)

Subjects/Keywords: Anonymity; Contextual security; Security; Sink location privacy; Source location privacy; Wireless sensor networks (WSN); Engineering; Electrical engineering; Computer engineering; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abuzneid, A. A. (2015). Fortified End-to-End Location Privacy and Anonymity in Wireless Sensor Networks: a Modular Approach . (Thesis). University of Bridgeport. Retrieved from https://scholarworks.bridgeport.edu/xmlui/handle/123456789/1089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abuzneid, Abdelshakour A. “Fortified End-to-End Location Privacy and Anonymity in Wireless Sensor Networks: a Modular Approach .” 2015. Thesis, University of Bridgeport. Accessed January 26, 2020. https://scholarworks.bridgeport.edu/xmlui/handle/123456789/1089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abuzneid, Abdelshakour A. “Fortified End-to-End Location Privacy and Anonymity in Wireless Sensor Networks: a Modular Approach .” 2015. Web. 26 Jan 2020.

Vancouver:

Abuzneid AA. Fortified End-to-End Location Privacy and Anonymity in Wireless Sensor Networks: a Modular Approach . [Internet] [Thesis]. University of Bridgeport; 2015. [cited 2020 Jan 26]. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/1089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abuzneid AA. Fortified End-to-End Location Privacy and Anonymity in Wireless Sensor Networks: a Modular Approach . [Thesis]. University of Bridgeport; 2015. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/1089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

19. Abdel Malik, Philip. Multidimensional epidemiological transformations : addressing location-privacy in public health practice.

Degree: PhD, 2011, University of Plymouth

 The ability to control one’s own personally identifiable information is a worthwhile human right that is becoming increasingly vulnerable. However just as significant, if not… (more)

Subjects/Keywords: 361; Location-Privacy : Public Health : Epidemiology : Personal Information : Geomasks : Transformations : Information sharing : Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdel Malik, P. (2011). Multidimensional epidemiological transformations : addressing location-privacy in public health practice. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/901

Chicago Manual of Style (16th Edition):

Abdel Malik, Philip. “Multidimensional epidemiological transformations : addressing location-privacy in public health practice.” 2011. Doctoral Dissertation, University of Plymouth. Accessed January 26, 2020. http://hdl.handle.net/10026.1/901.

MLA Handbook (7th Edition):

Abdel Malik, Philip. “Multidimensional epidemiological transformations : addressing location-privacy in public health practice.” 2011. Web. 26 Jan 2020.

Vancouver:

Abdel Malik P. Multidimensional epidemiological transformations : addressing location-privacy in public health practice. [Internet] [Doctoral dissertation]. University of Plymouth; 2011. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/10026.1/901.

Council of Science Editors:

Abdel Malik P. Multidimensional epidemiological transformations : addressing location-privacy in public health practice. [Doctoral Dissertation]. University of Plymouth; 2011. Available from: http://hdl.handle.net/10026.1/901


University of North Texas

20. Cox, Trissa. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications.

Degree: 2012, University of North Texas

 Information privacy is a major concern for consumers adopting emerging technologies dependent on location-based services. This study sought to determine whether a relationship exists among… (more)

Subjects/Keywords: Information privacy; location-based services; perceived playfulness; locatability; personalization; privacy concern; behavioral intention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cox, T. (2012). Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc115059/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cox, Trissa. “Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications.” 2012. Thesis, University of North Texas. Accessed January 26, 2020. https://digital.library.unt.edu/ark:/67531/metadc115059/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cox, Trissa. “Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications.” 2012. Web. 26 Jan 2020.

Vancouver:

Cox T. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications. [Internet] [Thesis]. University of North Texas; 2012. [cited 2020 Jan 26]. Available from: https://digital.library.unt.edu/ark:/67531/metadc115059/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cox T. Factors Associated with Behavioral Intention to Disclose Personal Information on Geosocial Networking Applications. [Thesis]. University of North Texas; 2012. Available from: https://digital.library.unt.edu/ark:/67531/metadc115059/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

21. Palanisamy, Balaji. Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms.

Degree: PhD, Computer Science, 2013, Georgia Tech

 Cloud Computing represents a recent paradigm shift that enables users to share and remotely access high-powered computing resources (both infrastructure and software/services) contained in off-site… (more)

Subjects/Keywords: Cloud computing; MapReduce; Big data; Cost-optimization; Locality-awareness; Caching; System privacy; Location privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palanisamy, B. (2013). Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/52157

Chicago Manual of Style (16th Edition):

Palanisamy, Balaji. “Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms.” 2013. Doctoral Dissertation, Georgia Tech. Accessed January 26, 2020. http://hdl.handle.net/1853/52157.

MLA Handbook (7th Edition):

Palanisamy, Balaji. “Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms.” 2013. Web. 26 Jan 2020.

Vancouver:

Palanisamy B. Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms. [Internet] [Doctoral dissertation]. Georgia Tech; 2013. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/1853/52157.

Council of Science Editors:

Palanisamy B. Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms. [Doctoral Dissertation]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/52157


Rice University

22. Hussain, Siam Umar. P3: Privacy Preserving Positioning for Smart Automotive Systems.

Degree: MS, Engineering, 2016, Rice University

 This thesis presents the first provably secure localization method for smart automotive systems. Using this method, a car, lost due to unavailability of GPS, can… (more)

Subjects/Keywords: Smart Cars; Secure Automotive System; Location Privacy; Location Based Services; Secure Function Evaluation; Garbled Circuit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hussain, S. U. (2016). P3: Privacy Preserving Positioning for Smart Automotive Systems. (Masters Thesis). Rice University. Retrieved from http://hdl.handle.net/1911/95544

Chicago Manual of Style (16th Edition):

Hussain, Siam Umar. “P3: Privacy Preserving Positioning for Smart Automotive Systems.” 2016. Masters Thesis, Rice University. Accessed January 26, 2020. http://hdl.handle.net/1911/95544.

MLA Handbook (7th Edition):

Hussain, Siam Umar. “P3: Privacy Preserving Positioning for Smart Automotive Systems.” 2016. Web. 26 Jan 2020.

Vancouver:

Hussain SU. P3: Privacy Preserving Positioning for Smart Automotive Systems. [Internet] [Masters thesis]. Rice University; 2016. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/1911/95544.

Council of Science Editors:

Hussain SU. P3: Privacy Preserving Positioning for Smart Automotive Systems. [Masters Thesis]. Rice University; 2016. Available from: http://hdl.handle.net/1911/95544


Virginia Tech

23. Wang, Ting. Wireless Network Physical Layer Security with Smart Antenna.

Degree: PhD, Electrical and Computer Engineering, 2013, Virginia Tech

 Smart antenna technique has emerged as one of the leading technologies for enhancing the quality of service in wireless networks. Because of its ability to… (more)

Subjects/Keywords: Wireless Network Security; Localization; Location privacy; Anti-eavesdropping; Smart Antenna; Beamforming; Location Spoofing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, T. (2013). Wireless Network Physical Layer Security with Smart Antenna. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/23243

Chicago Manual of Style (16th Edition):

Wang, Ting. “Wireless Network Physical Layer Security with Smart Antenna.” 2013. Doctoral Dissertation, Virginia Tech. Accessed January 26, 2020. http://hdl.handle.net/10919/23243.

MLA Handbook (7th Edition):

Wang, Ting. “Wireless Network Physical Layer Security with Smart Antenna.” 2013. Web. 26 Jan 2020.

Vancouver:

Wang T. Wireless Network Physical Layer Security with Smart Antenna. [Internet] [Doctoral dissertation]. Virginia Tech; 2013. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/10919/23243.

Council of Science Editors:

Wang T. Wireless Network Physical Layer Security with Smart Antenna. [Doctoral Dissertation]. Virginia Tech; 2013. Available from: http://hdl.handle.net/10919/23243


Halmstad University

24. Rambrandt, Johan. The possibilities of location-based marketing and the challenges of privacy : A cross-cultural study between Sweden and New Zealand.

Degree: Engineering and Science, 2016, Halmstad University

  Abstract Title: The possibilities of location-based marketing and the challenges of privacy – a cross cultural study between Sweden and New Zealand. Date: 2016-05-20… (more)

Subjects/Keywords: Privacy; Location-based services; Customer behavior; Location-based marketing; Applications and Smartphones

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rambrandt, J. (2016). The possibilities of location-based marketing and the challenges of privacy : A cross-cultural study between Sweden and New Zealand. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rambrandt, Johan. “The possibilities of location-based marketing and the challenges of privacy : A cross-cultural study between Sweden and New Zealand.” 2016. Thesis, Halmstad University. Accessed January 26, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rambrandt, Johan. “The possibilities of location-based marketing and the challenges of privacy : A cross-cultural study between Sweden and New Zealand.” 2016. Web. 26 Jan 2020.

Vancouver:

Rambrandt J. The possibilities of location-based marketing and the challenges of privacy : A cross-cultural study between Sweden and New Zealand. [Internet] [Thesis]. Halmstad University; 2016. [cited 2020 Jan 26]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rambrandt J. The possibilities of location-based marketing and the challenges of privacy : A cross-cultural study between Sweden and New Zealand. [Thesis]. Halmstad University; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Menfors, Martina. Geotagging in social media : exploring the privacy paradox.

Degree: Education and IT, 2015, University of Borås

  Increasingly, online social media networks allow users to use geotagging. This method of adding location data to various content shared in real time has… (more)

Subjects/Keywords: Location Data Privacy; Geotagging; Geo-social Networks (GeoSNs); Privacy Paradox; Privacy concerns; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Menfors, M. (2015). Geotagging in social media : exploring the privacy paradox. (Thesis). University of Borås. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-8685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Menfors, Martina. “Geotagging in social media : exploring the privacy paradox.” 2015. Thesis, University of Borås. Accessed January 26, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-8685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Menfors, Martina. “Geotagging in social media : exploring the privacy paradox.” 2015. Web. 26 Jan 2020.

Vancouver:

Menfors M. Geotagging in social media : exploring the privacy paradox. [Internet] [Thesis]. University of Borås; 2015. [cited 2020 Jan 26]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-8685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Menfors M. Geotagging in social media : exploring the privacy paradox. [Thesis]. University of Borås; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-8685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

26. Sun, Yan. INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS.

Degree: PhD, Computer Science and Engineering, 2008, Penn State University

 The development of Next Generation Network (NGN) will integrate various different networks and services into one single All-IP based architecture. IMS promises a cost-effective evolution… (more)

Subjects/Keywords: network mobility; service convergence; heterogeneous networks; location privacy; overload control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, Y. (2008). INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/9069

Chicago Manual of Style (16th Edition):

Sun, Yan. “INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS.” 2008. Doctoral Dissertation, Penn State University. Accessed January 26, 2020. https://etda.libraries.psu.edu/catalog/9069.

MLA Handbook (7th Edition):

Sun, Yan. “INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS.” 2008. Web. 26 Jan 2020.

Vancouver:

Sun Y. INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS. [Internet] [Doctoral dissertation]. Penn State University; 2008. [cited 2020 Jan 26]. Available from: https://etda.libraries.psu.edu/catalog/9069.

Council of Science Editors:

Sun Y. INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS. [Doctoral Dissertation]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/9069


Université Catholique de Louvain

27. Werner, Jolan. Quantification de l'anonymat dans les bases de données.

Degree: 2017, Université Catholique de Louvain

Avec le nombre grandissant de bases de données contenant maintes informations sur maints individus, les questions de la vie privée et de l'anonymat reviennent souvent… (more)

Subjects/Keywords: Anonymat; Base de données; Location privacy; Caractérisation; Caracterisation; Information; Data bases

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Werner, J. (2017). Quantification de l'anonymat dans les bases de données. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/thesis:10768

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Werner, Jolan. “Quantification de l'anonymat dans les bases de données.” 2017. Thesis, Université Catholique de Louvain. Accessed January 26, 2020. http://hdl.handle.net/2078.1/thesis:10768.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Werner, Jolan. “Quantification de l'anonymat dans les bases de données.” 2017. Web. 26 Jan 2020.

Vancouver:

Werner J. Quantification de l'anonymat dans les bases de données. [Internet] [Thesis]. Université Catholique de Louvain; 2017. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/2078.1/thesis:10768.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Werner J. Quantification de l'anonymat dans les bases de données. [Thesis]. Université Catholique de Louvain; 2017. Available from: http://hdl.handle.net/2078.1/thesis:10768

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. SRIMONGKOLPITAK, UTHAIWAN. SENSOR SOURCE LOCATION PRIVACY BASED ON RANDOM PERTURBATIONS.

Degree: D., Engr. Electrical Engineering and Computer Science, 2015, Catholic U of America

This thesis deals with securing the source location in Wireless Sensor Networks (WSNs). Sensor source location privacy, which means to protect source sensors' locations of… (more)

Subjects/Keywords: Computer science; SECURITY; SOURCE LOCATION PRIVACY; WIRELESS SENSOR NETWORK

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

SRIMONGKOLPITAK, U. (2015). SENSOR SOURCE LOCATION PRIVACY BASED ON RANDOM PERTURBATIONS. (Doctoral Dissertation). Catholic U of America. Retrieved from http://hdl.handle.net/1961/cuislandora:28235

Chicago Manual of Style (16th Edition):

SRIMONGKOLPITAK, UTHAIWAN. “SENSOR SOURCE LOCATION PRIVACY BASED ON RANDOM PERTURBATIONS.” 2015. Doctoral Dissertation, Catholic U of America. Accessed January 26, 2020. http://hdl.handle.net/1961/cuislandora:28235.

MLA Handbook (7th Edition):

SRIMONGKOLPITAK, UTHAIWAN. “SENSOR SOURCE LOCATION PRIVACY BASED ON RANDOM PERTURBATIONS.” 2015. Web. 26 Jan 2020.

Vancouver:

SRIMONGKOLPITAK U. SENSOR SOURCE LOCATION PRIVACY BASED ON RANDOM PERTURBATIONS. [Internet] [Doctoral dissertation]. Catholic U of America; 2015. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/1961/cuislandora:28235.

Council of Science Editors:

SRIMONGKOLPITAK U. SENSOR SOURCE LOCATION PRIVACY BASED ON RANDOM PERTURBATIONS. [Doctoral Dissertation]. Catholic U of America; 2015. Available from: http://hdl.handle.net/1961/cuislandora:28235


University of Ottawa

29. Hezaveh, Maryam. Privacy Preservation for Nearby-Friends and Nearby-Places Location-Based Services .

Degree: 2019, University of Ottawa

 This thesis looks at the problem of discovering nearby friends and nearby places of interest in a privacy-preserving way using location-based services on mobile devices… (more)

Subjects/Keywords: Location-Based Services; Privacy; Homomorphic Encryption; Private Information Retrieval; Smartphones Application

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hezaveh, M. (2019). Privacy Preservation for Nearby-Friends and Nearby-Places Location-Based Services . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/39234

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hezaveh, Maryam. “Privacy Preservation for Nearby-Friends and Nearby-Places Location-Based Services .” 2019. Thesis, University of Ottawa. Accessed January 26, 2020. http://hdl.handle.net/10393/39234.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hezaveh, Maryam. “Privacy Preservation for Nearby-Friends and Nearby-Places Location-Based Services .” 2019. Web. 26 Jan 2020.

Vancouver:

Hezaveh M. Privacy Preservation for Nearby-Friends and Nearby-Places Location-Based Services . [Internet] [Thesis]. University of Ottawa; 2019. [cited 2020 Jan 26]. Available from: http://hdl.handle.net/10393/39234.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hezaveh M. Privacy Preservation for Nearby-Friends and Nearby-Places Location-Based Services . [Thesis]. University of Ottawa; 2019. Available from: http://hdl.handle.net/10393/39234

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

30. Chen, Jiefeng. Characterizing and quantifying privacy in internet services.

Degree: Electrical Engineering & Telecommunications, 2014, University of New South Wales

 An increasing amount of personal information from different sources is collected and mined by different entities in the age of Internet, however the privacy implications… (more)

Subjects/Keywords: Location-based social network; Privacy; Online social network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, J. (2014). Characterizing and quantifying privacy in internet services. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/53908 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12618/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Chen, Jiefeng. “Characterizing and quantifying privacy in internet services.” 2014. Doctoral Dissertation, University of New South Wales. Accessed January 26, 2020. http://handle.unsw.edu.au/1959.4/53908 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12618/SOURCE02?view=true.

MLA Handbook (7th Edition):

Chen, Jiefeng. “Characterizing and quantifying privacy in internet services.” 2014. Web. 26 Jan 2020.

Vancouver:

Chen J. Characterizing and quantifying privacy in internet services. [Internet] [Doctoral dissertation]. University of New South Wales; 2014. [cited 2020 Jan 26]. Available from: http://handle.unsw.edu.au/1959.4/53908 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12618/SOURCE02?view=true.

Council of Science Editors:

Chen J. Characterizing and quantifying privacy in internet services. [Doctoral Dissertation]. University of New South Wales; 2014. Available from: http://handle.unsw.edu.au/1959.4/53908 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12618/SOURCE02?view=true

[1] [2] [3] [4]

.