Gabriel Ghinita
Calculated based on number of publications stored in Pure and citations from Scopus
20062025

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Accelerating Performance of Bilinear Map Cryptography using FPGA

    Ouatu, A., Ghinita, G. & Rughinis, R., 19 Jun 2024, CODASPY 2024 - Proceedings of the 14th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 103-113 11 p. (CODASPY 2024 - Proceedings of the 14th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Differentially-Private Neural Network Training with Private Features and Public Labels

    Monir, I. A. & Ghinita, G., 18 Aug 2024, Big Data Analytics And Knowledge Discovery, Dawak 2024. Wrembel, R., Chiusano, S., Kotsis, G., Tjoa, A. & Khalil, I. (eds.). Springer Science and Business Media Deutschland GmbH, Vol. 14912. p. 208-222 15 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Fair Spatial Indexing: A paradigm for Group Spatial Fairness

    Shaham, S., Ghinita, G. & Shahabi, C., 22 Nov 2023, Advances in Database Technology - EDBT. 2 ed. OpenProceedings.org, p. 150-161 12 p. (Advances in Database Technology - EDBT; vol. 27, no. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • VPASS: Voice Privacy Assistant System for Monitoring In-home Voice Commands

    Tran, B., Reddy Kona, S. H., Liang, X., Ghinita, G., Summerour, C. & Batsis, J. A., 2023, 2023 20th Annual International Conference on Privacy, Security and Trust, PST 2023. Institute of Electrical and Electronics Engineers Inc., (2023 20th Annual International Conference on Privacy, Security and Trust, PST 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2021

    An efficient and secure location-based alert protocol using searchable encryption and Huffman codes

    Shaham, S., Ghinita, G. & Shahabi, C., 2021, Advances in Database Technology - EDBT 2021: 24th International Conference on Extending Database Technology, Proceedings. Velegrakis, Y., Velegrakis, Y., Zeinalipour, D., Chrysanthis, P. K., Chrysanthis, P. K. & Guerra, F. (eds.). OpenProceedings.org, p. 265-276 12 p. (Advances in Database Technology - EDBT; vol. 2021-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • HTF: Homogeneous Tree Framework for Differentially-Private Release of Location Data

    Shaham, S., Ghinita, G., Ahuja, R., Krumm, J. & Shahabi, C., 2 Nov 2021, 29th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2021. Meng, X., Wang, F., Lu, C.-T., Huang, Y., Shekhar, S. & Xie, X. (eds.). Association for Computing Machinery, p. 184-194 11 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Citations (Scopus)
  • Secure dynamic skyline queries using result materialization

    Zeighami, S., Ghinita, G. & Shahabi, C., Apr 2021, Proceedings - 2021 IEEE 37th International Conference on Data Engineering, ICDE 2021. IEEE Computer Society, p. 157-168 12 p. 9458849. (Proceedings - International Conference on Data Engineering; vol. 2021-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Citations (Scopus)
  • Sharing of Network Flow Data across Organizations using Searchable Encryption

    Florea, I. M., Ghinita, G. & Rughinis, R., May 2021, Proceedings - 2021 23rd International Conference on Control Systems and Computer Science Technologies, CSCS 2021. Institute of Electrical and Electronics Engineers Inc., p. 189-196 8 p. 9481067. (Proceedings - 2021 23rd International Conference on Control Systems and Computer Science Technologies, CSCS 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2020

    Differentially-private next-location prediction with neural networks

    Ahuja, R., Ghinita, G. & Shahabi, C., 2020, Advances in Database Technology - EDBT 2020: 23rd International Conference on Extending Database Technology, Proceedings. Bonifati, A., Zhou, Y., Vaz Salles, M. A., Bohm, A., Olteanu, D., Fletcher, G., Khan, A. & Yang, B. (eds.). OpenProceedings.org, p. 121-132 12 p. (Advances in Database Technology - EDBT; vol. 2020-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Enhancing the performance of spatial queries on encrypted data through graph embedding

    Shaham, S., Ghinita, G. & Shahabi, C., 2020, Data and Applications Security and Privacy - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Proceedings. Singhal, A. & Vaidya, J. (eds.). Springer, p. 289-309 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12122 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Citations (Scopus)
  • 2019

    AMIS: Programmable privacy-preserving network measurement for analysis and troubleshooting

    Wu, X., Xu, C., Luo, Y., Bumgardner, C., Ghinita, G. & McGarry, M., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. Institute of Electrical and Electronics Engineers Inc., p. 733-734 2 p. 8717829. (2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A privacy-preserving, accountable and spam-resilient geo-marketplace

    Nguyen, K., Ghinita, G., Naveed, M. & Shahabi, C., 5 Nov 2019, 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2019. Banaei-Kashani, F., Trajcevski, G., Guting, R. H., Kulik, L. & Newsam, S. (eds.). Association for Computing Machinery, p. 299-308 10 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Citations (Scopus)
  • A utility-preserving and scalable technique for protecting location data with geo-indistinguishability

    Ahuja, R., Ghinita, G. & Shahabi, C., 2019, Advances in Database Technology - EDBT 2019: 22nd International Conference on Extending Database Technology, Proceedings. Herschel, M., Kaoudi, Z., Binnig, C., Reinwald, B., Fundulaki, I. & Galhardas, H. (eds.). OpenProceedings.org, p. 217-228 12 p. (Advances in Database Technology - EDBT; vol. 2019-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Citations (Scopus)
  • Protecting against inference attacks on co-location data

    Ahuja, R., Ghinita, G., Krishna, N. & Shahabi, C., Jul 2019, ICCCN 2019 - 28th International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., 8847050. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2018

    An empirical study of differentially-private analytics for high-speed network data

    Niculaescu, O. G. & Ghinita, G., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 149-151 3 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hybrid differentially-private string matching

    Rao, F. Y., Ghinita, G. & Bertino, E., 19 Jul 2018, Proceedings - 2018 IEEE 38th International Conference on Distributed Computing Systems, ICDCS 2018. Institute of Electrical and Electronics Engineers Inc., p. 478-488 11 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Privacy-preserving spatial crowdsourcing based on anonymous credentials

    Yi, X., Rao, F. Y., Ghinita, G. & Bertino, E., 13 Jul 2018, Proceedings - 2018 IEEE 19th International Conference on Mobile Data Management, MDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 187-196 10 p. (Proceedings - IEEE International Conference on Mobile Data Management; vol. 2018-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Citations (Scopus)
  • 2017

    A Game-Oriented Educational Tool for Location Privacy Topics (Demo Paper)

    Yang, J., Niculaescu, O. G. & Ghinita, G., 7 Nov 2017, GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems. Ravada, S., Hoel, E., Tamassia, R., Newsam, S., Trajcevski, G. & Trajcevski, G. (eds.). Association for Computing Machinery, 93. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems; vol. 2017-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Differentially-private big data analytics for high-speed research network traffic measurement

    Niculaescu, O. G., Maruseac, M. & Ghinita, G., 22 Mar 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 151-153 3 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2016

    Differentially-private mining of representative travel patterns

    Maruseac, M. & Ghinita, G., 20 Jul 2016, Proceedings - 2016 IEEE 17th International Conference on Mobile Data Management, IEEE MDM 2016. Chow, C.-Y., Jayaraman, P. & Wu, W. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 272-281 10 p. 7517805. (Proceedings - IEEE International Conference on Mobile Data Management; vol. 2016-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Privacy-preserving mining of sequential association rules from provenance workflows

    Maruseac, M. & Ghinita, G., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 127-129 3 p. (CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2015

    Differentially-private mining of moderately-frequent high-confidence association rules

    Maruseac, M. & Ghinita, G., 2 Mar 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 13-24 12 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Disseminating location privacy threats and protection techniques through capture-the-flag games (vision paper)

    Ghinita, G. & Maruseac, M., 3 Nov 2015, Proceedings of the 2nd ACM SIGSPATIAL Workshop on Privacy in Geographic Information Collection and Analysis, GeoPrivacy 2015. Janowicz, K., McKenzie, G. & Kossinets, G. (eds.). Association for Computing Machinery, Inc, a2. (Proceedings of the 2nd ACM SIGSPATIAL Workshop on Privacy in Geographic Information Collection and Analysis, GeoPrivacy 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Citation (Scopus)
  • Hardware acceleration of Private Information Retrieval protocols using GPUs

    Maruseac, M., Ghinita, G., Ouyang, M. & Rughinis, R., 8 Sept 2015, Proceedings of the ASAP 2015 - 2015 IEEE 26th International Conference on Application-Specific Systems, Architectures and Processors. Institute of Electrical and Electronics Engineers Inc., p. 120-127 8 p. 7245719. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors; vol. 2015-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • PrivGeoCrowd: A toolbox for studying private spatial Crowdsourcing

    To, H., Ghinita, G. & Shahabi, C., 26 May 2015, 2015 IEEE 31st International Conference on Data Engineering, ICDE 2015. IEEE Computer Society, p. 1404-1407 4 p. 7113387. (Proceedings - International Conference on Data Engineering; vol. 2015-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Citations (Scopus)
  • Reduced relative errors for short sequence counting with differential privacy

    Costea, S., Ghinita, G., Rughinis, R. & Tapus, N., 27 Jul 2015, Proceedings - 2015 20th International Conference on Control Systems and Computer Science, CSCS 2015. Dumitrache, I., Florea, A. M., Pop, F. & Dumitrascu, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 475-482 8 p. 7168471. (Proceedings - 2015 20th International Conference on Control Systems and Computer Science, CSCS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2014

    Differentially private location recommendations in geosocial networks

    Zhang, J. D., Ghinita, G. & Chow, C. Y., 5 Oct 2014, Proceedings - 2014 IEEE 15th International Conference on Mobile Data Management, IEEE MDM 2014. Institute of Electrical and Electronics Engineers Inc., p. 59-68 10 p. 6916904. (Proceedings - IEEE International Conference on Mobile Data Management; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Citations (Scopus)
  • Large-scale frequent subgraph mining in MapReduce

    Lin, W., Xiao, X. & Ghinita, G., 2014, 2014 IEEE 30th International Conference on Data Engineering, ICDE 2014. IEEE Computer Society, p. 844-855 12 p. 6816705. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    71 Citations (Scopus)
  • Secure mutual proximity zone enclosure evaluation

    Choi, S., Ghinita, G. & Bertino, E., 4 Nov 2014, 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2014. Schneider, M., Gertz, M., Huang, Y., Sankaranarayanan, J. & Krumm, J. (eds.). Association for Computing Machinery, p. 133-142 10 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems; vol. 04-07-November-2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Towards efficient private spatial information retrieval using GPUs

    Maruseac, M., Ghinita, G., Ouyang, M. & Rughinis, R., 4 Nov 2014, 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2014. Schneider, M., Gertz, M., Huang, Y., Sankaranarayanan, J. & Krumm, J. (eds.). Association for Computing Machinery, p. 405-408 4 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems; vol. 04-07-November-2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    A privacy-preserving location-based alert system

    Ghinita, G. & Rughinis, R., 2013, 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2013. p. 422-425 4 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Authenticating spatial skyline queries with low communication overhead

    Lo, H. & Ghinita, G., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 177-179 3 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Efficient and accurate strategies for differentially-private sliding window queries

    Cao, J., Xiao, Q., Ghinita, G., Li, N., Bertino, E. & Tan, K. L., 2013, Advances in Database Technology - EDBT 2013: 16th International Conference on Extending Database Technology, Proceedings. p. 191-202 12 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Citations (Scopus)
  • 2012

    A comparative evaluation of private information retrieval techniques in location-based services

    Costea, S., Barbu, D. M., Ghinita, G. & Rughinis, R., 2012, Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012. p. 618-623 6 p. 6337993. (Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • A lightweight secure provenance scheme for wireless sensor networks

    Sultana, S., Ghinita, G., Bertino, E. & Shehab, M., 2012, Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems, ICPADS 2012. p. 101-108 8 p. 6413708. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    42 Citations (Scopus)
  • Secure sensor network SUM aggregation with detection of malicious nodes

    Choi, S., Ghinita, G. & Bertino, E., 2012, Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, LCN 2012. p. 19-27 9 p. 6423606. (Proceedings - Conference on Local Computer Networks, LCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2011

    Privacy-preserving assessment of location data trustworthiness

    Dai, C., Rao, F. Y., Ghinita, G. & Bertino, E., 2011, 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2011. p. 231-240 10 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • The optimization of situational awareness for insider threat detection

    Brancik, K. & Ghinita, G., 2011, CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. p. 231-235 5 p. (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Citations (Scopus)
  • Towards mechanisms for detection and prevention of data exfiltration by insiders

    Bertino, E. & Ghinita, G., 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. Association for Computing Machinery, p. 10-19 10 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    44 Citations (Scopus)
  • 2010

    A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations

    Choi, S., Ghinita, G. & Bertino, E., 2010, Database and Expert Systems Applications - 21st International Conference, DEXA 2010, Proceedings. PART 1 ed. p. 368-384 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6261 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Citations (Scopus)
  • Controlling data disclosure in computational PIR protocols

    Shang, N., Ghinita, G., Zhou, Y. & Bertino, E., 2010, Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010. p. 310-313 4 p. (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Privacy-aware location-aided routing in mobile ad hoc networks

    Ghinita, G., Azarmi, M. & Bertino, E., 2010, MDM2010 - 11th International Conference on Mobile Data Management. p. 65-74 10 p. 5489811. (Proceedings - IEEE International Conference on Mobile Data Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • Privacy-preserving matching of spatial datasets with protection against background knowledge

    Ghinita, G., Vicente, C. R., Shang, N. & Bertino, E., 2010, 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2010. p. 3-12 10 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Privacy-preserving similarity measurement for access control policies

    Cho, E. A., Ghinita, G. & Bertino, E., 2010, Proceedings of the 6th ACM Workshop on Digital Identity Management, DIM '10, Co-located with CCS'10. p. 3-11 9 p. 1866859. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • Private record matching using differential privacy

    Inan, A., Kantarcioglu, M., Ghinita, G. & Bertino, E., 2010, Advances in Database Technology - EDBT 2010 - 13th International Conference on Extending Database Technology, Proceedings. p. 123-134 12 p. (Advances in Database Technology - EDBT 2010 - 13th International Conference on Extending Database Technology, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    129 Citations (Scopus)
  • 2009

    A hybrid technique for private location-based queries with database protection

    Ghinita, G., Kalnis, P., Kantarcioglu, M. & Bertino, E., 2009, Advances in Spatial and Temporal Databases - 11th International Symposium, SSTD 2009, Proceedings. p. 98-116 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5644 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Citations (Scopus)
  • Interactive location cloaking with the PROBE obfuscator

    Ghinita, G., Damiani, M. L., Bertino, E. & Silvestri, C., 2009, Proceedings - 2009 10th International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009. p. 355-356 2 p. 5088956. (Proceedings - IEEE International Conference on Mobile Data Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Citations (Scopus)
  • Outsourcing search services on private spatial data

    Yiu, M. L., Ghinita, G., Jensen, C. S. & Kalnis, P., 2009, Proceedings - 25th IEEE International Conference on Data Engineering, ICDE 2009. p. 1140-1143 4 p. 4812485. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Citations (Scopus)
  • Preventing velocity-based linkage attacks in location-aware applications

    Ghinita, G., Damiani, M. L., Silvestri, C. & Bertino, E., 2009, 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2009. p. 246-255 10 p. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    98 Citations (Scopus)
  • Towards location-based access control in healthcare emergency response

    Vicente, C. R., Kirkpatrick, M., Ghinita, G., Bertino, E. & Jensen, C. S., 2009, SPRINGL 2009 - Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. p. 22-26 5 p. (SPRINGL 2009 - Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Citations (Scopus)
Your message has successfully been sent.
Your message was not sent due to an error.