[1] |
周傲英, 杨彬, 金澈清 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011,34(7):1155-1171. ZHOU A Y , YANG B , JIN C Q , et al. Location-based services:archi-tecture and progress[J]. Chinese Journal of Computers, 2011,34(7):1155-1171.
|
[2] |
VIRRANTAUS K , MARKKULA J , GARMASH A , et al. Developing GIS-supported location-based services[A]. WISE[C]. Kyoto, 2001.66-75.
|
[3] |
GRUTESTER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking[A]. Mobi-Sys[C]. USA, 2003.31-42.
|
[4] |
SWEENEY L . k-Anonymity: a model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Konwledge Based Systems, 2002,10(5):557-570.
|
[5] |
CHOW C Y , MOKBEL M F . Privacy in location-based services: a system architecture perspective[J]. SIGSPATIAL Special, 2009,1(2):23-27.
|
[6] |
MOKBEL M F , CHOW C Y , AREF W G . The new Casper: query processing for location services without compromising privacy[A]. VLDB[C]. Seoul Korea, 2006.763-774.
|
[7] |
XIAO Z , MENG X , XU J . Quality aware privacy protection for loca-tion-based services[A]. DASFAA[C]. Thailand, 2007.434-446.
|
[8] |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1):1-18.
|
[9] |
BAMBA B , LIU L , PESTI P , et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. WWW[C]. Bei-jing, China, 2008.237-246.
|
[10] |
WANG Y , XU D , HE X , et al. L2P2:location-aware location privacy protection for location-based services[A]. INFOCOM[C]. Orlando, FL, USA, 2012.1996-2004.
|
[11] |
SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C , et al. Protecting location privacy: optimal strategy against localization at-tacks[A]. CCS[C]. North Carolina, USA, 2012.617-627.
|
[12] |
GAO S , MA J F , SHI W S , et al. LTPPM: a location and trajectory privacy protection mechanism in participatory sensing[J]. Wireless Communications and Mobile Computing, 2015,15(1):155-169.
|
[13] |
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location based services: anonymizers are not necessary[A]. ACM SIGMOD[C]. Vancouver, BC, Canada, 2008.121-132.
|
[14] |
YIU M L , JENSEN C S , HUANG X , et al. SpaceTwist:managing the trade-offs among location privacy, query performance, and query ac-curacy in mobile services[A]. ICDE[C]. Mexico, 2008.366-375.
|
[15] |
HASHEM T , KULIK L . Don't trust anyone: privacy protection for location-based services[J]. Pervasive and Mobile Computing, 2011,7(1):44-59.
|
[16] |
PAPADIAS D , SHEN Q , TAO Y , et al. Group nearest neighbor queries[A]. ICDE[C]. MA, USA, 2004.301-312.
|
[17] |
PAPADIAS D , TAO Y , MOURATIDIS K , et al. Aggregate nearest neighbor queries in spatial databases[J]. ACM Transactions on Data-base Systems, 2005,30(2):529-576.
|
[18] |
LIAN X , L CHEN , LIAN X , et al. Probabilistic group nearest neighbor queries in uncertain databases[J]. IEEE Transactions on Knowledge and Data Engineering, 2008,20(6):809-824.
|
[19] |
HASHEM T , KULIK L , ZHANG R . Privacy preserving group nearest neighbor queries[A]. EDBT[C]. Lausanne, 2010.489-500.
|
[20] |
HUANG Y , VISHWANATHAN R . Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques[A]. GLOBECOM[C]. Miami, FL, 2010.1-5.
|
[21] |
ASHOURI-TALOUKI M , BARAANI-DASTJERDI A , SELCUK A A . GLP: a cryptographic approach for group location privacy[J]. Computer Communications, 2012,35(12):1527-1533.
|
[22] |
SOLANAS A , MARTINEZ-BALLESTE A . A TTP-free protocol for location privacy in location-based services[J]. Computer Communications, 2008,31(6):1181-1191.
|
[23] |
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[A]. SIGSPATIAL GIS[C]. New York, NY, USA, 2006.171-178.
|
[24] |
CHE Y , YANG Q , HONG X . A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks[A]. WCNC[C]. Paris, France, 2012.2098-2102.
|
[25] |
FOUQUE P A , POUPARD G , STERN J . Sharing decryption in the context of voting or lotteries[A]. FC[C]. London, 2001.90-104.
|
[26] |
雷浩 等. 面向有差异群体的联合决策方案[J]. 电子学报, 2005,33(8):1523-1528. LEI H , et al. A joint decision-making scheme for groups with members having different superiorities[J]. Chinese Journal of Electronics, 2005,33(8):1523-1528.
|
[27] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11):612-613.
|
[28] |
PAILLIER P . Public-key cryptosystems based on composite degree residuosity classes[A]. EUROCRYPT[C]. Prague, 1999.223-238.
|
[29] |
DAMGARD I , FAZIO N , NICOLOSI A . Non-interactive zero-knowledge from homomorphic encryption[A]. TCC[C]. New York, NY, USA, 2006.41-59.
|