1 HÖLLERER T H , FEINER S K . Mobile augmented reality[M]// KARIMI H A.Telegeoinformatics: Location-Based Computing and Services. Boca Raton: CRC Press, 2004:392.
2 张啸剑,孟小峰 . 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014, 37(4):927-949. (ZHANG X J, MENG X F. Differential privacy in data publication and analysis[J]. Chinese Journal of Computers, 2014, 37(4):927-949.)
3 KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services[C]// Proceedings of the 25th International Conference on Data Engineering Workshops. Piscataway: IEEE, 2005:1248-1248.
4 YIU M L, JENSEN C S , HUANG X , et al . SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services[C]// Proceedings of the IEEE 24th International Conference on Data Engineering. Piscataway: IEEE, 2008:366-375.
5 潘晓,郝兴,孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2011, 47(1):121-129. (PAN X, HAO X, MENG X F. Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2011, 47(1):121-129.)
6 GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1):1-18.
7 张建明,赵玉娟,江浩斌,等 . 车辆自组网的位置隐私保护技术[J]. 通信学报, 2012, 33(8):180-189. ZHANG J M , ZHAO Y J , JIANG H B , et al . Research on protection technology for location privacy in VANET[J]. Journal on Communications, 2012, 33(8):180-189.
8 RAYA M , HUBAUX J P . The security of vehicular ad hoc networks[C]// Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM, 2005:11-21.
9 胡兆玮,杨静 . 轨迹隐私保护技术研究进展分析[J]. 计算机科学, 2016, 43(4):16-23. (HU Z W, YANG J. Survey of trajectory privacy preserving techniques[J]. Computer Science, 2016, 43(4):16-23.)
10 WASEF A , SHEN X . REP: location privacy for VANET using random encryption periods[J]. Mobile Networks and Applications, 2010, 15(1): 172-185.
11 REEM D . The geometric stability of Voronoi diagrams with respect to small changes of the sites[C]// Proceedings of the 27th Annual Symposium on Computational Geometry. New York: ACM, 2011: 254-263.
12 CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011,15(2):351-380.
13 NERGIZ M E , GÖK M Z . Hybrid k-anonymity[J]. Computers and Security, 2014, 44:51-63.
14 DWORK C . The promise of differential privacy: a tutorial on algorithmic techniques[C]// Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science. Piscataway: IEEE, 2011:1-2.
15 KALNIS P , GHINITA G , MOURATIDIS K , et al . Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 19(12) :1719-1733.
16 BRINKHOFF T . A framework for generating network-based moving objects[J]. An International Journal on Advances of Computer Science for Geographic Information Systems(Geo Informatica) ,2002,6(2): 153-180. |