[1] |
GRUSTER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// International Conference on Mobile Systems. 2013: 31-42.
|
[2] |
MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy[C]// The 32nd International Conference on Very Large Data Bases. Seoul,South Korea, 2006: 763-774.
|
[3] |
XU T , CAI Y . Feeling-based location privacy protection for location-based services[C]// ACM Conference on Computer &Communications Security(CCS). 2009: 348-357.
|
[4] |
CHOW C , MOKEL M F , LIU X . A peer to peer spatial cloaking algorithm for anonymous location based service[C]// The 14th ACM International Symposium on Geographic Information Systems. 2006: 171-178.
|
[5] |
PAVEL S , FRANK D , KURT R . Map-aware position sharing for location privacy in non-trusted systems[C]// The 10th International Conference Pervasive Computing. Newcastle England, 2012: 388-405.
|
[6] |
徐建, 黄孝喜, 郭鸣 ,等. 动态 P2P 网络中基于匿名链的位置隐私保护[J]. 浙江大学学报(工学版), 2012,46(4): 712-718.
|
|
XU J , HUANG X X , GUO M ,et al. Location privacy through an anonymous chain in dynamic P2P network[J]. Journal of Zhejiang University(Engineering Science), 2012,46(4): 712-718.
|
[7] |
CHENG R , ZHANG Y , BERTINO E ,et al. Preserving user location privacy in mobile data management infrastructures[C]// Privacy Enhancing Technology Workshop (PET’ 06). Cambridge,United Kingdom, 2006: 393-412.
|
[8] |
ANDERSEN M S , KJAERGAARD M B . Towards a new classification of location privacy methods in pervasive computing[J]. Social Informatics and Telecommunications Engineering, 2012,104: 150-161.
|
[9] |
TRONG N P , TRAN K D . A novel trajectory privacy-preserving future time index structure in moving object databases[C]// The 3th International Conference on Computer and Computational Intelligence. 2012: 124-134.
|
[10] |
魏志强, 康密军, 贾东宁 ,等. 普适计算隐私保护策略研究[J]. 计算机学报, 2010,33(1): 128-138.
|
|
WEI Z Q , KANG M J , JIA D N ,et al. Research on privacy protection policy for pervasive computing[J]. Chinese Journal of Computers, 2010,33(1): 128-138.
|
[11] |
YI X , PAULET R , BERTINO E ,et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,(99): 1-14.
|
[12] |
PAULET R , KAOSAR M G , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210.
|
[13] |
GHINITA G , KALNIS P , KHOSHGOZARAN A ,et al. Privacy queries in location based services:anonymizers are not necessary[C]// The 27th ACM Conference on Management of Data(SIGMOD’08). 2008: 121-132.
|
[14] |
HU H , LU R X , HUANG C ,et al. An efficient privacy-preserving location based services query scheme in outsourced cloud[J]. IEEE Transactions on Vehicular Technology, 2016,65(9): 7729-7739.
|
[15] |
ZHU H , LIU F , LI H . Efficient and privacy-preserving polygons spatial query framework for location-based services[J]. IEEE Internet of Things Journal, 2015,(99): 1-1.
|
[16] |
毛典辉, 曹健, 蔡强 ,等. 情景感知的位置隐私保护方法研究进展[J]. 通信学报, 2013,34(Z1): 230-234.
|
|
MAO D H , CAO J , CAI Q ,et al. Survey of the context-aware location privacy-preserving techniques[J]. Journal on Communications, 2013,34(Z1): 230-234.
|
[17] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems Applications and Services. USA, 2003: 31-42
|
[18] |
YIU M L , JENSEN C S , HUANG X ,et al. SpaceTwist:managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]// The IEEE International Conference on Data Engineering. 2008: 366-375.
|
[19] |
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services[C]// The 14th ACM International Symposium on Advances in Geographic Information Systems(ACM-GIS’06). 2006: 171-178.
|
[20] |
KIDO H , YANGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[C]// The 2nd IEEE International Conference on Pervasive Services(ICPS'05). 2005: 88-97.
|
[21] |
NIU B , LI Q H , ZHU X Y ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// The IEEE 33th International Conference on Computer Communications (INFOCOM’14). 2014: 754-762.
|
[22] |
霍峥, 孟小峰, 黄毅 . PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013,36(4): 716-726.
|
|
HUO Z , MENG X F , HUANG Y . PrivateCheckIn:trajectory privacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013,36(4): 716-726.
|
[23] |
AMINI S , LINDQVIST J , HONG J ,et al. Cache:caching location-enhanced content to improve user privacy[J]. ACM Sigmobile Computing &Communication Review, 2010,14(3): 19-21.
|
[24] |
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P ,et al. Hiding in the mobile crowd:location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2013,11(3): 266-279.
|
[25] |
ZHU X Y , CHI H T , NIU B ,et al. Mobicache:when k-anonymity meets cache[C]// IEEE Global Communication Conference (GLOBECOM). 2013: 820-825.
|
[26] |
NIU B , ZHU X Y , LI W H ,et al. EPcloak:an efficient and privacy-preserving spatial cloaking scheme for LBSs[C]// The 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems(MASS’14). 2014: 398-406.
|
[27] |
NIU B , LI Q H , ZHU X Y ,et al. Enhancing privacy through caching in location-based services[C]// The IEEE 34th International Conference on Computer Communications (INFOCOM’15). 2015: 1017-1025.
|
[28] |
西格兰·托比 . 集体智慧编程[M]. 北京: 电子工业出版社, 2009: 89-91.
|
|
SEGRAN T . Programming collective intelligence[M]. Beijing: Publishing House of Electronics IndustryPress, 2009: 89-91.
|