[1] BURKE J A, ESTRIN D, HANSEN M, et al. Participatory sensing [C]// WSW'06: Proceedings of the 1st Workshop on World-Sensor-Web. New York: ACM, 2006:117-134. [2] MUN M, REDDY S, SHILTON K, et al. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research [C]// Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services. New York: ACM, 2009: 55-68. [3] ZHANG J, MA J, WANG W, et al. A novel privacy protection scheme for participatory sensing with incentives [C]// CCIS 2012: Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems. Piscataway: IEEE, 2012: 1017-1021. [4] AHMADI H, PHAM N, GANTI R, et al. Privacy-aware regression modeling of participatory sensing data [C]// Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. New York: ACM, 2010: 99-112. [5] LEE J S, HOH B. Sell your experiences: a market mechanism based incentive for participatory sensing [C]// PerCom 2010: Proceedings of the 2010 IEEE International Conference on Pervasive Computing and Communications. Piscataway: IEEE, 2010: 60-68. [6] The Ministry of Health in China. GB5749-2006 Drinking water standards [S]. Beijing: Standards Press of China, 2006:1-8.(中华人民共和国卫生部.GB5749—2006生活饮用水卫生标准[S].北京:中国标准出版社,2006:1-8.) [7] AGRAWAL R, EVFIMIEVSKI A, SRIKANT R. Information sharing across private databases [C]// Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2003: 86-97. [8] XIE Q, HENGARTNER U. Privacy-preserving matchmaking for mobile social networking secure against malicious users [C]// PST 2011: Proceedings of the 2011 Ninth Annual International Conference on Privacy, Security and Trust. Piscataway: IEEE, 2011: 252-259. [9] FREEDMAN M J, NISSIM K, PINKAS B. Efficient private matching and set intersection [C]// Advances in Cryptology—EUROCRYPT 2004. Berlin: Springer, 2004: 1-19. [10] YE Q, WANG H, PIEPRZYK J. Distributed private matching and set operations [C]// ISPEC 2008: Proceedings of the 4th International Conference on Information Security Practice and Experience, LNCS 4991. Berlin: Springer, 2008: 347-360. [11] LU R, LIN X, LIANG X, et al. Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network [C]// Proceedings of the Fifth International Conference on Body Area Networks. New York: ACM, 2010: 8-15. [12] YANG Z, ZHANG B, DAI J, et al. E-SmallTalker: a distributed mobile system for social networking in physical proximity [C]// ICDCS 2010: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems. Piscataway: IEEE, 2010: 468-477. [13] SUN J, ZHANG R, ZHANG Y. Privacy-preserving spatiotemporal matching [C]// INFOCOM 2013: Proceedings of the 2013 IEEE Conference on Computer Communications. Piscataway: IEEE, 2013: 800-808. [14] ZHU X. Security and privacy preservation mechanisms in vehicular Ad Hoc network [D]. Hefei: Hefei University of Technology, 2013.(朱晓玲.VANET安全和隐私保护机制研究[D].合肥:合肥工业大学,2013.) [15] SWEENEY L. k-anonymity: a model for protecting privacy [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557-570. [16] CAMENISCH J, GROTH J. Group signatures: better efficiency and new theoretical aspects [C]// Proceedings of the 4th International Conference on Security in Communication Networks, LNCS 3352. Berlin: Springer, 2005: 120-133. [17] FAN L, CAO P, ALMEIDA J, et al. Summary cache: a scalable wide-area Web cache sharing protocol [J]. IEEE/ACM Transactions on Networking, 2000, 8(3): 281-293. [18] BLOOM B H. Space/time trade-offs in Hash coding with allowable errors [J]. Communications of the ACM, 1970, 13(7): 422-426. [19] BONOMI F, MITZENMACHER M, PANIGRAHY R, et al. An improved construction for counting bloom filters [M]// ESA 2006: Proceedings of the 14th Annual European Symposium on Algorithms, LNCS 4168. Berlin: Springer, 2006: 684-695. [20] GUO D, LIU Y, LI X, et al. False negative problem of counting bloom filter [J]. IEEE Transactions on Knowledge and Data Engineering, 2010, 22(5): 651-664. |