Cited By
View all- Wang XHou XRios RTippenhauer NOchoa M(2022)Constrained Proximity Attacks on Mobile TargetsACM Transactions on Privacy and Security10.1145/349854325:2(1-29)Online publication date: 4-Mar-2022
- Zhang WYin GSha YYang J(2021) Protecting the Moving User’s Locations by Combining Differential Privacy and -Anonymity under Temporal Correlations in Wireless Networks Wireless Communications and Mobile Computing10.1155/2021/66919752021(1-12)Online publication date: 2-Feb-2021
- Oleynikov IPagnin ESabelfeld A(2020)Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping PartyComputer Security – ESORICS 202010.1007/978-3-030-58951-6_33(677-697)Online publication date: 12-Sep-2020
- Show More Cited By