[1] Mokbel M F.Privacy in location-based services:State-of-the-art and research directions[A].Proceedings of the International Conference on Mobile Data Management[C].USA:IEEE,2007.228.
[2] Reza Shokri.Hiding in the mobile crowd:location privacy through collaboration[J].IEEE Transactions on Dependable Secure Computer,2014,11(3):266-279.
[3] Gruteser M,Grunwal D.Anonymous usage of location-based services through spatial and temporal cloaking[A].Proceedings of the International Conference on Mobile Systems Applications and Services[C].USA:IEEE,2003.163-168.
[4] M F Mokbel,C Y Chow,W G Aref.The new Casper:Query processing for location services without compromising privacy[A].Proceedings of the International Conference on Very Large Data Bases[C].USA:VLDB,2006.763-774.
[5] Bhuvan B,Ling L,et a1.Supporting anonymous location queries in mobile environments with privacy grid[A].Proceedings of the 17th International Conference on WWW[C].USA:ACM,2008.237-246.
[6] P Kalnis,G Ghinita,et al.Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge Data Engineering,2007,19(12):1719-1733.
[7] 王丽娜,彭瑞卿,等.个人移动数据收集中的多维轨迹匿名方法[J].电子学报,2013,41(8):1653-1659. Wang Li-na,Peng Rui-qing,et al.Multi-dimensional trajectory anonymity in collecting personal mobility data[J].Acta Electronica Sinica,2013,41(8):1653-1659.(in Chinese)
[8] H Kido,et al.An anonymous communication technique using dummies for location-based services[A].Proceedings of IEEE ICPS[C].USA:IEEE,2005.88-97.
[9] Rinku Dewri.Exploiting service similarity for privacy in location based search queries[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(2):374-383.
[10] Kenta Miura,Fumiaki Sato.A hybrid method of user privacy protection for location based services[A].Proceedings of the 7th International Conference on Complex,Intelligent,and Software Intensive Systems[C].Taiwan:CISIS,2013.434-439.
[11] Agusti Solanas,Antoni Mart Ballest.A TTP-free protocol for location privacy in location based services[J].Computer Communications,2008,31(6):1181-1191.
[12] Kyriakos Mouratidis.Strong location privacy:A case study on shortest path queries[A].Proceedings of IEEE 29th International Conference on Data Engineering (ICDE)[C].USA:IEEE,2013.136-143.
[13] 刘华玲,郑建国,孙辞海.基于贪心扰动的社交网络隐私保护研究[J].电子学报,2013,41(8):1586-1591. Liu Hua-ling,Zheng Jian-guo,Sun Ci-hai.Privacy preserving in social networks based on greedy perturbation[J].Acta Electronica Sinica,2013,41(8):1586-1591.(in Chinese)
[14] M Piorkowski,N Sarafijanovic Djukic,M Grossg.CRAWDAD data set epfl/mobility[DB].http://crawdad.cs.dartmouth.edu,2009-02-24.
[15] 马知恩,周义仓.传染病动力学的数学建模与研究[M].北京:科学出版社,2004. |