원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.9 No.1
2015.01
pp.249-258
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Architecture, Objects and Category of LBS
3. How to Protect Web-based LBS Privacy
4. From the View of Policy and Law
5. From the View of Techniques
5.1 Fake Data Methods
5.2 K-anonymity
5.3 Obfuscation Method
6. Conclusion
Acknowledgements
References
1. Introduction
2. Architecture, Objects and Category of LBS
3. How to Protect Web-based LBS Privacy
4. From the View of Policy and Law
5. From the View of Techniques
5.1 Fake Data Methods
5.2 K-anonymity
5.3 Obfuscation Method
6. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보