参考文献
[1]潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281.
[2]Sweeney L.k-anonymity:A Model for Protecting Privacy[J].International Journal on Uncertainty,Fuzzi-ness and Knowledge-based Systems,2002,10(5):557-570.
[3]Gruteser M,Grunwald D.Anonymous Usage of Location-based Services Through Spatial and Temporal Cloak-ing[C]//Proceedings of the 1st International Con-ference on Mobile Systems,Applications and Services.San Francisco,USA:ACM
Press,2003:31-42.
[4]Gedik B,Liu Ling.A Customizable k-anonymity Model for Protecting Location Privacy[C]//Proceedings of the 1st International Conference on Distributed Computing Systems.Columbus,USA:IEEE Computer Society,2005:620-629.
[5]Gedik B,Liu Ling.Protecting Location Privacy with Personalized k-anonymity:Architecture and Algori-thms[J].Mobile Computing,2008,7(1):1-18.
[6]Liu Xinxin,Liu Kaikai,Guo Linke,et al.A Game-theoretic Approach for Achieving k-anonymity in Loca-tion Based Services[C]//Proceedings of INFOCOM’13.Turin,Italy:IEEE Press,2013:2985-2993.
[7]Beresford A R,Stajano F.Location Privacy in Pervasive Computing[J].Pervasive Computing,2003,2(1):46-55.
[8]Beresford A R,Stajano F.Mix Zones:User Privacy in Location-aware Services[C]//Proceedings of Pervasive Computing and Communications Workshops.Vienna,Austria:IEEE Press,2004:127-131.
[9]Zacharouli P,Gkoulalas-Divanis A,Verykios V S.A k-anonymity Model for Spatio-temporal Data[C]//Proceedings of ICDEW’07.Washington D.C.,USA:IEEE Press,2007:555-564.
[10]Palanisamy B,Liu L.Mobimix:Protecting Location Privacy with Mix-zones over Road Networks[C]//Proceedings of ICDE’11.Hannover,Germany:IEEE Press,2011:494-505.
[11]Liu Xinxin,Zhao Han,Pan Miao,et al.Traffic-aware Multiple Mix Zone Placement for Protecting Location Privacy[C]//Proceedings of INFOCOM’12.Orlando,USA:IEEE Press,2012:972-980.
[12]Du Suguo,Zhu Haojin,Li Xiaolong,et al.Mix Zone in Motion:Achieving Dynamically Cooperative Location Privacy Protection in Delay-tolerant Networks[J].IEEE Transactions on Vehicular Technology,2013,62(9):4565-4575.
[13]Kido H,Yanagisawa Y,Satoh T.An Anonymous Communication Technique Using Dummies for Location-based Services[C]//Proceedings of Conference on Perva-sive Services.Santorini,Greece:IEEE Press,2005:88-97.
[14]You T H,Peng W C,Lee W C.Protecting Moving Trajectories with Dummies[C]//Proceedings of Conference on Mobile Data Management.Mannheim,Germany:IEEE Press,2007:278-282.
[15]Tran M T,Echizen I,Duong A D.Binomial-mix-based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-based Services[C]//Proceedings of Conference on Availability,Reliability,and
Security.Krakow,Poland:IEEE Press,2010:580-585.
[16]Miura K,Sato F.A Hybrid Method of User Privacy Protection for Location Based Services[C]//Proceed-ings of CISIS’13.Washington D.C.,USA:IEEE Press,2013:434-439.
[17]Khoshgozaran A,Shirani-Mehr H.SPIRAL:A Scalable Private Information Retrieval Approach to Location Privacy[C]//Proceedings of Mobile Data Management Workshops.Washington D.C.,USA:IEEE Press,2008:55-62.
[18]Mouratidis K.Strong Location Privacy:A Case Study on Shortest Path Queries[C]//Proceedings of ICDEW’13.Brisbane,Australia:IEEE Press,2013:136-143.
[19]Yiu M L,Jensen C S,Huang Xuegang,et al.Spacetwist:Managing the Trade-offs Among Location Privacy,Query Performance,and Query Accuracy in Mobile Services[C]//Proceedings of ICDEW’08.Cancun,Mexico:IEEE Press,2008:366-375.
[20]黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985.
编辑金胡考 |