参考文献
[1]Mohan P,Padmanabhan V N,Ramjee R.Nericell:Rich Monitoring of Road and Traffic Conditions Using Mobile Smartphones[C]//Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems.New York,USA:ACM Press,2008:323-336.
[2]Eriksson J,Girod L,Hull B,et al.The Pothole Part-ol:Using a Mobile Sensor Network for Road Surface Monitoring[C]//Proceedings of the 6th International Conference on Mobile Systems,Applications,and Services.New York,USA:ACM Press,2008:29-39.
[3]Beresford A R,Stajano F.Location Privacy in Pervasive Computing[J].IEEE Pervasive Computing,2003,2(1):46-55.
[4]Gruteser M,Grunwald D.Anonymous Usage of Location-based Services Through Spatial and Temporal Cloak-ing[C]//Proceedings of the 1st International Con-ference on Mobile Systems,Applications and Services.New York,USA:ACM Press,2003:31-42.
[5]Gruteser M,Liu Xuan.Protecting Privacy in Continuous Location-tracking Applications[J].IEEE Security & Privacy,2004,2(2):28-34.
[6]Krumm J.Inference Attacks on Location Tracks[C]//Proceedings of the 5th International Conference on Pervasive Computing.Berlin,Germany:Springer,2007:127-143.
[7]Krumm J.A Survey of Computational Location Privacy[J].Personal and Ubiquitous Computing,2009,1(6):391-399.
[8]Kulik L.Privacy for Real-time Location-based Services[J].SIGSPATIAL Special,2009,1(2):9-14.
[9]霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830.
[10]Samarati P,Sweeney L.Protecting Privacy When Dis-closing Information:k-anonymity and Its Enforcement Through Generalization and Suppression:SRI-CSL-98-04[R].1998.
[11]Sweeney L.k-anonymity:A Model for Protecting Privacy[J].International Journal of Uncertainty,Fuzzi-ness and Knowledge-based Systems,2002,10(5):557-570.
[12]Gedik B,Liu Ling.Location Privacy in Mobile Systems:A Personalized Anonymization Model[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems.Washington D.C.,USA:IEEE Press,2005:620-629.
[13]Hoh B,Gruteser M,Xiong Hui,et al.Preserving Privacy in GPS Traces via Uncertainty-aware Path Cloak-ing[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:161-171.
[14]Pfitzmann A,Khntopp M.Anonymity,Unobservability,and Pseudonymity——A Proposal for Terminology[C]//Proceedings of International Workshop on Design Issues in Anonymity and Unobservability.Berlin,Germany:Springer,2001:1-9.
[15]Ma C Y T,Yau D K Y,Yip N K,et al.Privacy Vulnerability of Published Anonymous Mobility Traces[J].IEEE/ACM Transactions on Networking,2013,21(3):720-733.
[16]杨卫东,何云华,孙利民.车载自组网节点轨迹隐私攻防博弈模型[J].通信学报,2013,34(z1):240-245.
[17]Zang Hui,Bolot J.Anonymization of Location Data does not Work:A Large-scale Measurement Study[C]//Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.New York,USA:ACM Press,2011:145-156.
[18]王彩梅,郭亚军,郭艳华.位置服务中用户轨迹的隐私度量[J].软件学报,2012,23(2):352-360.
[19]Lou Yin,Zhang Chengyang,Zheng Yu,et al.Map-matching for Low-sampling-rate GPS Trajectories[C]//Proceedings of the 17th ACM SIGSPATIAL Inter-national Conference on Advances in Geographic Info-rmation Systems.New York,USA:ACM Press,2009:352-361.
编辑顾逸斐 |