[1] |
王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4): 693-712.
|
|
WANG L , MENG X F . Position big data privacy protection research review[J]. Journal of Software, 2014,25(4): 693-712.
|
[2] |
NIU B , LI Q , ZHU X ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// 2014 IEEE Conference on Computer Communications(Infocom). c2014: 754-762.
|
[3] |
ZHOU C , MA C , YANG S ,et al. A location privacy preserving method based on sensitive diversity for LBS[M]// Network and Parallel Computing. Berlin:Springer, 2014: 409-422.
|
[4] |
CICEK A E , NERGIZ M E , SAYGIN Y . Ensuring location diversity in privacy-preserving spatio-temporal data publishing[J]. The International Journal on Very Large Data Bases, 2014,23(4): 609-625.
|
[5] |
PAN X , XU J , MENG X . Protecting location privacy against location-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012,24(8): 1506-1519.
|
[6] |
?IK?NYS L , THOMSEN J R , ?ALTENIS S , et al. A location privacy aware friend locator[M]. Berlin: SpringerPress, 2009: 405-410.
|
[7] |
CHOW C Y , MOKBEL M F , BAO J ,et al. Query-aware location anonymization for road networks[J]. Geoinformatica, 2011,15(3): 571-607.
|
[8] |
CHOW C Y , MOKBEL M F , LEONG H V . On efficient and scalable support of continuous queries in mobile peer-to-peer environments[J]. IEEE Transactions on Mobile Computing, 2011,10(10): 1473-1487.
|
[9] |
AMBAINIS A . Upper bound on the communication complexity of private information retrieval[M]. Berlin: SpringerPress, 1997: 401-407.
|
[10] |
KUSHILEVITZ E , OSTROVSKY R . Replication is not needed:single database,computationally-private information retrieval[C]// Annual Symposium on Foundations of Computer Science. c1997: 364-373.
|
[11] |
GHINITA G , KALNIS P , KHOSHGOZARAN A ,et al. Private queries in location based services:anonymizers are not necessary[C]// The ACM Sigmod International Conference on Management of Data. c2008: 121-132.
|
[12] |
FUNG E , KELLARIS G , PAPADIAS D . Combining differential privacy and pir for efficient strong location privacy[M]// Advances in Spatial and Temporal Databases. Berlin:Springer, 2015: 295-312.
|
[13] |
YU M , YANG K , WEI L ,et al. Practical private information retrieval supporting keyword search in the cloud[C]// 2014 6th International Conference on Wireless Communications and Signal Processing (WCSP). c2014: 1-6
|
[14] |
张峰, 倪巍伟 . 基于伪随机数加密的保护位置隐私近邻查询方法[J]. 华东师范大学学报(自然科学版), 2015(5): 128-142.
|
|
ZHANG F , NI W W . Protect the location privacy neighbor query methods based on the pseudo random number of encryption[J]. Journal of East China Normal University( Natural Science Edition), 2015(5): 128-142.
|
[15] |
SHVACHKO K , KUANG H , RADIA S ,et al. The Hadoop distributed file system[C]// The 26th Symposium on Mass Storage Systems and Technologies (MSST),IEEE. c2010: 1-10.
|
[16] |
ZAHARIA M , CHOWDHURY M , DAS T ,et al. Resilient distributed datasets:a fault-tolerant abstraction for in-memory cluster computing[C]// Usenix Conference on Networked Systems Design and Implementation (NSDI). c2012: 141-146.
|
[17] |
PAPADOPOULOS S , BAKIRAS S , PAPADIAS D . pCloud:a distributed system for practical PIR[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(1): 115-127.
|
[18] |
MAYBERRY T , BLASS E O , CHAN A H . PIRMAP:efficient private information retrieval for MapReduce[M]// Financial Cryptography and Data Security. Berlin:Springer, 2013: 371-385.
|
[19] |
BLASS E O , DI P R , MOLVA R ,et al. PRISM–privacy-preserving search in MapReduce[M]// Privacy Enhancing Technologies. Berlin:Springer, 2012: 180-200.
|
[20] |
刘金义, 刘爽 . Voronoi 图应用综述[J]. 工程图学学报, 2004,25(2): 125-132.
|
|
LIU J Y , LIU S . Voronoi diagram application review[J]. Journal of Engineering Graphics, 2004,25(2): 125-132.
|
[21] |
ASC sequoia benchmark codes[EB/OL]. .
|
[22] |
GMP[EB/OL]. .
|