[1] |
CHEEMA M A , ZHANG W , LIN X , et al. Efficiently processing snapshot and continuous reverse k nearest neighbors queries[J]. The VLDB Journal, 2012,21(5): 703-728.
|
[2] |
WU D , WANG X , SUN L , et al. Identity privacy-based reliable routing method in VANETs[J]. Peer-to-Peer Networking and Applications, 2014,7(3): 285-294.
|
[3] |
薛姣, 刘向宇, 杨晓春, 王斌 等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011,34(5):865-878. XUE J , LIU X Y , YANG X C , et al. A location privacy preserving ap-proach on road network[J]. Chinese Journal of Computers, 2011,34(5):865-878.
|
[4] |
潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1):121-129. PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1):121-129.
|
[5] |
GEDIK B , LIU L . Location privacy in mobile systems:a personalized anonymization model[A]. Distributed Computing Systems,ICDCS 2005,Proceedings of 25th IEEE International Conference[C]. 2005. 620-629.
|
[6] |
MOKBEL M F , CHOW C Y , AREF W G . The new Casper:query processing for location services without compromising privacy[A]. Proceedings of the 32nd International Conference on Very Large Data Bases[C].VLDB Endowment, 2006. 763-774.
|
[7] |
KALNIS P , GHINITA G , MOURATIDIS K , et al. Preventing loca-tion-based identity inference in anonymous spatial queries[J]. Knowl-edge and Data Engineering,IEEE Transactions, 2007,19(12): 1719-1733.
|
[8] |
GHINITA G , KALNIS P , SKIADOPOULOS S . PRIVE:anonymous location-based queries in distributed mobile systems[A]. Proceedings of the 16th International Conference on World Wide Web[C]. ACM, 2007. 371-380.
|
[9] |
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[A]. Proceedings of the 14th Annual ACM International Symposium on Advances in Geo-graphic Information Systems[C]. 2006. 171-178.
|
[10] |
HONG J I , LANDAY J A . An architecture for privacy-sensitive ubiqui-tous computing[A]. Proceedings of the 2nd International Conference on Mobile Systems,Applications,and Services[C]. 2004. 177-189.
|
[11] |
KIDO H , YANAGISAWA Y , SATOH T . An architecture for privacy-sensitive ubiqui-tous computing[A]. Perva-sive Services,Proceedings of International Conference[C]. 2005. 88-97.
|
[12] |
YIU M L , JENSEN C S , HUANG X G , LU H . SpaceTwist:managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[A]. IEEE 24th International Conference on Data Engineering[C]. 2008. 366-375.
|
[13] |
GONG Z , SUN G Z , XIE X . Protecting privacy in location-based services using k-anonymity without cloaked region[A]. Mobile Data Management (MDM),2010 Eleventh International Conference[C]. 2010. 366-371.
|
[14] |
黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10):1976-1985. HANG Y , HUO Z , MENG X F . CoPrivacy:a collaborative location privacy-preserving method without cloaking region[J]. Chinese Journal of Computers, 2011,34(10):1976-1985.
|
[15] |
GRUSTER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[A]. Proceedings of the 1st International Conference on Mobile Systems,Applications and Services[C]. 2003. 31-42.
|
[16] |
MOKBEL M F . Towards privacy-aware location-based database serv-ers[A]. Data Engineering Workshops,Proceedings of 22nd Interna-tional Conference[C]. 2006. 93.
|
[17] |
CHOW C Y , MOKBEL M F , AREF W G . Casper*:query processing for location services without compromising privacy[J]. ACM Transac-tions on Database Systems (TODS), 2009,34(4): 24.
|
[18] |
LI T C , ZHU W T . Protecting user anonymity in location-based services with fragmented cloaking region[A]. Computer Science and Automation Engineering (CSAE),2012 IEEE International Conference[C]. 2012. 227-231.
|
[19] |
杨松涛, 马春光, 周长利 . 面向LBS的隐私保护模型及方案[J]. 通信学报, 2014,35(8):116-124. YANG S T , MA C G , ZHOU C L . Privacy preserving towards continuous query in location-based services[J]. Journal on Communications, 2014,35(8):116-124.
|
[20] |
SAYE R I , SETHIAN J A . Analysis and applications of the Voronoi implicit interface method[J]. Journal of Computational Physics, 2012, 231(18): 6051-6085.
|
[21] |
LIN X , LU R , LIANG X , et al. STAP:A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preserva-tion in vanets[A]. INFOCOM,2011 Proceedings IEEE, 2011. 2147-2155.
|