- Location Privacy in Mobile Systems: A Personalized Anonymization Model
- A Distortion-Based Metric for Location Privacy
- Measuring Unlinkability Revisited
- The impact of location privacy on opportunistic networks
- Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring
- Hiding Stars with Fireworks: Location Privacy through Camouflage
- Unraveling an Old Cloak: k-anonymity for Location Privacy
- A Unified Framework for Location Privacy
- SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services
- Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
- A Customizable k-Anonymity Model for Protecting Location Privacy
- Achieving k-anonymity Privacy Protection Using Generalization and Suppression
- k-anonymity: A Model for Protecting Privacy
- The Privacy Implications of Personal Locators: Why You Should Think Twice Before Voluntarily Availing Yourself to GPS Monitoring
- Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis
- Mix Zones: User Privacy in Location-aware Services
- A Formal Model of Obfuscation and Negotiation for Location Privacy
- Preserving User Location Privacy in Mobile Data Management Infrastructures
- A Survey of Computational Location Privacy
- A Study on The Value of Location Privacy
- Privacy Issues in Location-Aware Mobile Devices
- Protection of Location Privacy using Dummies for Location-based Services
- Protecting Location Privacy Through Path Confusion
- Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking
- A Distributed k-Anonymity Protocol for Location Privacy
- Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
- Concepts for Personal Location Privacy Policies
- Location Privacy Protection Through Obfuscation-based Techniques
- Preserving Location Privacy in Wireless LANs
- Survey on Location Privacy in Pervasive Computing
- AMOEBA: Robust Location Privacy Scheme for VANET
- Handicapping attacker's confidence: an alternative to k-anonymization