[1] |
HARRISON B , DEY A . What have you done with location-based services lately[J]. IEEE Pervasive Computing, 2009,8(4): 66-70.
|
[2] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[A]. Proceedings of the 1st International Conference on Mobile Systems, Applications and Ser-vices, A Francisco, California 2003. 21-42.
|
[3] |
BAMBA B , LIU L , PESTI P , et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. Proceedings of the 17th International Conference on World Wide Web[C]. Beijing, China, 2008. 237-246.
|
[4] |
LIU F , HUA K A , CAI Y . Query l-diversity in location-based ser-vices[A]. Proceedings of the 10th International Conference on Mobile Data Management: Systems, Services and Middleware[C]. 2009. 436-442.
|
[5] |
LEE B , OH J , YU H , et al. Protecting location privacy using location semantics[A]. Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C]. 2011. 1289-1297.
|
[6] |
KALNIS P , GHINITA G . MOURATIDIS K, et al. Preventing loca-tion-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007,19(12): 1719-1733.
|
[7] |
PINGLEY A , YU W , ZHANG N , et al. A context-aware scheme for privacy-preserving location-based services[J]. Computer Networks, 2012,56(11): 2551-2568.
|
[8] |
NI W , ZHENG J , CHONG Z . HilAnchor: location privacy protection in the presence of users' preferences[J]. Computer Science and Tech-nology, 2012,27(2): 413-427.
|
[9] |
CHOW C , MOKBEL M F , LIU X . A peer to peer spatial cloaking algorithm for anonymous location based services[A]. Proceedings of the ACM Symposium on Advances in Geographic Information Sys-tems, Arlington, VA 2006. 171-178.
|
[10] |
黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10):1976-1985. HUANG Y , HUO Z , MENG X F . CoPrivacy : a collaborative location privacy-preserving method without cloaking region[J]. Chinese Jour-nal of Computers, 2011,34(10):1976-1985.
|
[11] |
HU H B , XU J L . Non-exposure location anonymity[A]. IEEE 25th International Conference on Data Engineering [C]. 2009. 1120-1131.
|
[12] |
HASHEM T , KULIK L . “Don't trust anyone”: privacy protection for location-based services[A]. Pervasive and Mobile Computing, 2011,7(1): 44-59.
|
[13] |
NERGIZ M E , ATZORI M , SAYGIN Y , et al. Towards trajectory anonymization: a generalization-based approach[A]. Transactions on Data Privacy, 2009,2(1): 47-75.
|
[14] |
MEYEROWITZ J , CHOUDHURY R R . Hiding stars with fireworks:location privacy through camouflage[A]. Proceedings of the 15th An-nual International Conference on Mobile Computing and Network-ing[C]. Beijing, China, 2009. 345-356.
|
[15] |
BERESFORD A R , STAJANO F . Location privacy in pervasive com-puting[A]. IEEE Pervasive Computing, 2003,2(1): 46-55.
|
[16] |
HOH B , GRUTESER M , XIONG H , et al. Preserving privacy in GPS traces via uncertainty-aware path cloaking[A]. Proceedings of the 14th ACM Conference on Computer and Communications Security[C]. Alexandria, Virginia, USA, 2007. 161-171.
|
[17] |
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location-based services: anonymizers are not necessary[A]. Pro-ceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, Canada: ACM, 2008. 121-132.
|
[18] |
KHOSHGOZARA A , SHAHABI C , SHIRANI-MEHR H . Location privacy: going beyond k-anonymity, cloaking and anonymizers[A]. Knowledge and Information Systems, 2011, 26(3): 435-465.
|
[19] |
ASHOURI-TALOUKI M , BARAANI-DASTJERDI A , SELCUK A . GLP: a cryptographic approach for group location privacy[J]. Com-puter Communications, 2012, 35(12): 1527-1533.
|
[20] |
林欣, 李善平, 杨朝晖 . LBS 中连续查询攻击算法及匿名性度量[J]. 软件学报, 2009,20(4):1058-1068. LIN X , LI S P , YANG Z H . Attacking algorithms against continuous queries in LBS and anonymity measurement[J]. Chinese Journal of Software, 2009,20(4):1058-1068.
|
[21] |
ASONOV D . Querying Databases Privately: a New Approach to Pri-vate Information Retrieval[J]. Springer, 2004.
|