[1] XU N, ZHU D, LIU H, et al. Combining spatial cloaking and dummy generation for location privacy preserving[C]//ADMA 2012:Proceedings of the 8th International Conference on Advanced Data Mining and Applications, LNCS 7713. Berlin:Springer-Verlag, 2012:701-712.
[2] ASHOURI-TALOUKI M, BARAANI-DASTJERDI A, SELÇUK A A. The cloaked-centroid protocol:location privacy protection for a group of users of location-based services[J]. Knowledge and Information Systems, 2015, 45(3):589-615.
[3] GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//MobiSys'03:Proceedings of the First International Conference on Mobile Systems, Application, and Services. New York:ACM, 2003:31-42.
[4] MOKBEL M F, CHOW C-Y, AREF W G. The new Casper:query processing for location services without compromising privacy[C]//ICDE 2007:Proceedings of the 23rd International Conference on Data Engineering. Washington, DC:IEEE Computer Society, 2007:1499-1500.
[5] PAN X, XU J, MENG X. Protecting location privacy against location-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8):1506-1519.
[6] CHEN X, PANG J. Measuring query privacy in location-based services[C]//CODASPY'12:Proceedings of the Second ACM Conference on Data and Application Security and Privacy. New York:ACM, 2012:49-60.
[7] ZHOU C, MA C, YANG S, et al. A location privacy preserving method based on sensitive diversity for LBS[C]//NPC 2014:Proceedings of the 11th IFIP WG 10.3 International Conference on Network and Parallel Computing, LNCS 8707. Berlin:Springer-Verlag, 2014:409-422.
[8] PALANISAMY B, LIU L. Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14(3):495-508.
[9] GUO M, PISSINOU N, IYENGAR S S. Pseudonym-based anonymity zone generation for mobile service with strong adversary model[C]//CCNC 2015:Proceedings of the 201512th Annual IEEE Consumer Communications and Networking Conference. Piscataway, NJ:IEEE, 2015:335-340.
[10] NIU B, LI Q, ZHU X, et al. Achieving k-anonymity in privacy-aware location-based services[C]//Proceedings of the IEEE INFOCOM 2014. Piscataway, NJ:IEEE, 2014:754-762.
[11] GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services:anonymizers are not necessary[C]//SIGMOD'08:Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2008:121-132.
[12] PAPADOPOULOS S, BAKIRAS S, PAPADIAS D. pCloud:a distributed system for practical PIR[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(1):115-127.
[13] SCHLEGEL R, CHOW C-Y, HUANG Q, et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14(10):2158-2172.
[14] KHOSHGOZARAN A, SHIRANI-MEHR H, SHAHABI C. Blind evaluation of location based queries using space transformation to preserve location privacy[J]. GeoInformatica, 2013, 17(4):599-634.
[15] LU R, LIN X, SHI Z, et al. PLAM:a privacy-preserving framework for local-area mobile social networks[C]//Proceedings of the IEEE INFOCOM 2014. Piscataway, NJ:IEEE, 2014:763-771.
[16] PAULET R, KAOSAR M G, YI X, et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(5):1200-1210.
[17] SATOH T, KIDO H, YANAGISAWA Y. An anonymous communication technique using dummies for location-based services[C]//ICPS'05:Proceedings of the 2005 International Conference on Pervasive Services. Washington, DC:IEEE Computer Society, 2005:88-97. |