[1] |
KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, 2009,13(6):391-399.
|
[2] |
TIWARI S , KAUSHIK S , JAGWANI P , et al. A survey on LBS: sys-tem architecture, trends and broad research areas[C]// LNCS 7108: The 7th International Conference on Databases in Network Information Systems.Heidelberg:Springer. c2011:223-241.
|
[3] |
王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4):693-712. WANG L , MENG X F . Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014,25(4):693-712.
|
[4] |
王宇航, 张宏莉, 余翔湛 . 移动互联网中的位置隐私保护研究[J]. 通信学报, 2015,36(9):2015167. WANG Y H, , ZHANG H L , YU X Z . Research on location privacy in mobile Internet[J]. Journal on Communications, 2015,36(9):2015167.
|
[5] |
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based services[C]// The International Conference on Pervasive Services 2005. Washington,IEEE, c2005:88-97.
|
[6] |
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services[C]// The 21st International Conference on Data Engineering Workshops. Washington,IEEE, c2005:1248.
|
[7] |
GRUTESER M , GRUNWALD . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st Interna-tional Conference on Mobile, Systems, Applications and Services. New York,ACM, c2003:31-42.
|
[8] |
TALUKDER N , AHAMED S I . Preventing multiquery attack in location-based services[C]// The 3rd ACM Conference on Wireless Network Security. New York,ACM, c2010:25-36.
|
[9] |
BERSFORD A R , STAJANO F . Mix zones: user privacy in loca-tion-aware services[C]// The 2nd IEEE Annual Conference on Perva-sive Computing and Communications Workshops. Washington,IEEE, c2004:127-131.
|
[10] |
GAO S , MA J F , SHI W S , et al. TrPF: a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6):874-887.
|
[11] |
ARDAGNA C , CREMONINI M , DAMIANI E , et al. Location privacy protection through obfuscation-based techniques[C]// The 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security,Berlin: Springer. c2007:47-60.
|
[12] |
DAMIANI M L , BERTINO E , SILVESTRI . The probe framework for the personalized cloaking of private locations[J]. Transactions on Data Privacy, 2010,3(2):123-148.
|
[13] |
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location based services: anonymizers are not necessary[C]// The 2008 ACM SIGMOD International Conference on Management of Data. New York,ACM, c2008:121-132.
|
[14] |
MASCETTI S , FRENI D , BETTINI C , et al. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies[J]. VLDB Journal, 2011,20(4):541-566.
|
[15] |
LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy based location privacy in mobile services[C]// The Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access. New York,ACM, c2008:16-23.
|
[16] |
NIU B , LI Q , ZHU X et al. Achieving k-anonymity in privacy-aware loca-tion-based services[C]// The 33rd Annual IEEE International Conference on Computer Communications. Washington,IEEE, c2014:754-762.
|
[17] |
NIU B , ZHANG Z Y , LI X Q , et al. Privacy-area aware dummy gen-eration algorithms for location-based services[C]// The 2014 IEEE In-ternational Conference on Communication. Washington,IEEE, c2014:957-962.
|
[18] |
NIU B , LI Q , ZHU X , et al. Enhancing privacy through caching in location-based services[C]// The 34th Annual IEEE International Con-ference on Computer Communications. Washington,IEEE, c2015:1017-1025.
|
[19] |
XU T , CAI Y . Exploring historical location data for anonymity preser-vation in location-based services[C]// The 27th Conference on Com-puter Communications. Washington,IEEE, c2008:13-18.
|
[20] |
XU T , CAI Y . Feeling-based location privacy protection for loca-tion-based services[C]// The 16th ACM Conference on Computer and Communications Security. New York,ACM, c2009:348-357.
|
[21] |
CHOW C Y , MOKBEL M . Enabling private continuous queries for revealed user locations[C]// The 10th International Symposium on Spa-tial and Temporal Databases. Berlin,Springer, c2007:258-275.
|
[22] |
潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1):121-129. PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1):121-129.
|
[23] |
WANG Y , XU D B , HE X , et al. L2P2: location-aware location pri-vacy protection for location-based services[C]// The 31st Annual IEEE International Conference on Computer Communication. Washington,IEEE, c2012:1996-2004.
|
[24] |
LI X H , WANG E M , YANG W D , et al. DALP: a demand-aware location privacy protection scheme in continuous location-based services[J]. Concurrency and Computation:Practice and Experience, 2016,28(4):1219-1236.
|
[25] |
SCHLEGEL R , CHOW C Y , HUANG Q , et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015,14(10):2158-2172.
|
[26] |
BRINKOFFff T . A framework for generating network-based moving objects[J]. Geo Informatica, 2002,6(2):153-180.
|