参考文献
[1]刘经南,郭迟,彭瑞卿.移动互联网时代的位置服务[J].中国计算机学会通讯,2011,12(7):40-50.
[2]潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281.
[3]Zhang Chengyang,Huang Yan.Cloaking Locations for Anonymous Location Based Services:A Hybrid App-roach[J].GeoInformatica,2009,13(2):159-182.
[4]Chow Chiyin,Mokbel M F,Liu Xuan.Spatial Cloaking for Anonymous Location-based Services in Mobile Peer-to-Peer Environments[J].GeoInformatica,2011,15(2):351-380.
[5]Shankar P,Ganapathy V,Iftode L.Privately Querying Location-based Services with Sybilquery[C]//Pro-ceedings of the 11th International Conference on Ubiquitous Computing.New York,USA:ACM Press,2009:31-40.
[6]Ghinita G,Kalnis P,Khoshgozaran A,et al.Private Queries in Location Based Services:Anonymizers Are Not Necessary[C]//Proceedings of ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2008:121-132.
[7]徐建,黄孝喜,郭鸣,等.动态P2P 网络中基于匿名链的位置隐私保护[J].浙江大学学报:工学版,2012,46(4):712-718.
[8]Kido H,Yanagisawa Y,Satoh T.An Anonymous Communication Technique Using Dummies for Location-based Services[C]//Proceedings of International Con-ference on Pervasive Services.Washington D.C.,USA:IEEE Press,2005:88-97.
[9]Lung Yiu-Man,Jensen C S,Huang Xuegang,et al.Spacetwist:Managing the Trade-offs Among Location Privacy,Query Performance,and Query Accuracy in Mobile Services[C]//Proceedings of International Conference on Data
Engineering.Washington D.C.,USA:IEEE Press,2008:366-375.
[10]Palanisamy B,Liu Ling.Mobimix:Protecting Location Privacy with Mix-zones over Road Networks[C]//Pro-ceedings of International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2011:494-505.
(下转第172页)
(上接第167页)
[11]Bettini C,Sean W,Sushil J X.Protecting Privacy Against Location-based Personal Identification[C]//Proceedings of Secure Data Management Conference.Berlin,Germany:Springer-Verlag,2005:185-199.
[12]Boneh D,Boyen X,Shacham H.Short Group Signa-tures[C]//Proceedings of CRYPTO’04.Berlin,Germany:Springer-Verlag,2004:41-55.
[13]Machanavajjhala A,Kifer D,Gehrke J,et al.L-diversity:Privacy Beyond K-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,2(1):311-320.
[14]Krumm J.Inference Attacks on Location Tracks[C]//Pro-ceedings of International Conference on Pervasive Com-puting.Berlin,Germany:Springer-Verlag, 2007:127-143.
[15]Niu Ben,Li Qinghua,Zhu Xiaoyan,et al.Achieving K-anonymity in Privacy-aware Location-based Services[C]//Proceedings of INFOCOM’14.Washington D.C.,USA:IEEE Press,2014:754-762.
编辑刘冰 |