[1] LI M Y, ZHU H J, GAO Z Y, et al. All your location are belong to us:breaking mobile social networks for automated user location tracking[C]//Proceedings of the 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York:ACM, 2014:43-52. [2] BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003, 2(1):46-55. [3] MYLES G, FRIDAY A, DAVIES N. Preserving privacy in environments with location-based applications[J]. IEEE Pervasive Computing, 2003, 2(1):56-64. [4] GEDIK B, LIU L. Protecting location privacy with personalized k-anonymity:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1):1-18. [5] GRUTESTER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//MobiSys'03:Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. New York:ACM, 2003:31-42. [6] XU J L, TANG X Y, HU H B, et al. Privacy-conscious location-based queries in mobile environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(3):313-326. [7] HU H B, XU J L, CHEN Q, et al. Authenticating location-based services without compromising location privacy[C]//SIGMOD'12:Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2012:301-312. [8] YIU M L, JENSEN C S, HUANG X G, et al. SpaceTwist:managing the trade-offs among location privacy, query performance, and query accuracy in mobile services[C]//ICDE'08:Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. Piscataway, NJ:IEEE, 2008:366-375. [9] ŠIKSNYS L, THOMSEN J R, ŠALTENIS S, et al. Private and flexible proximity detection in mobile social networks[C]//Proceedings of the 2010 Eleventh International Conference on Mobile Data Management. Piscataway, NJ:IEEE, 2010:75-84. [10] NARAYANAN A, THIAGRARAJAN N, LAKHANI M, et al. Location privacy via private proximity testing[EB/OL].[2016-09-20]. https://www.shiftleft.org/papers/locpriv/locpriv.pdf. [11] NIELSEN J D, PAGTER J I, STAUSHOLM M B. Location privacy via actively secure private proximity testing[C]//Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). Piscataway, NJ:IEEE, 2012:381-386. [12] LIN X, HU H B, LI H P, et al. Private proximity detection and monitoring with vicinity regions[C]//MobiDE'13:Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Access. New York:ACM, 2013:5-12. [13] SALDAMLI G, CHOW R, JIN H X, et al. Private proximity testing with an untrusted server[C]//WiSec'13:Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York:ACM, 2013:113-118. [14] JING T, LIN P, LU Y F, et al. FPODG:a flexible and private proximity testing based on ‘one degree’ grid[J]. International Journal of Sensor Networks, 2016, 20(3):199-207. [15] FREEDMAN M J, NISSIM K, PINKAS B. Efficient private matching and set intersection[C]//Proceedings of the 2004 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3027. Berlin:Springer, 2004:1-19. [16] OKAMOTO T, UCHIYAMA S. A new public-key cryptosystem as secure as factoring[C]//Proceedings of the 1998 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 1403. Berlin:Springer, 1998:308-318. [17] NACCACHE D, STERN J. A new public key cryptosystem based on higher residues[C]//CCS'98:Proceedings of the 5th ACM Conference on Computer and Communications Security. New York:ACM, 1998:59-66. [18] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[C]//EUROCRYPT'99:Proceedings of the 1999 17th International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999:223-238. [19] LI R H, WU C K. An unconditionally secure protocol for multi-party set intersection[C]//ACNS'07:Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2007:226-236. [20] BRINKHOFF T. A framework for generating network-based moving objects[J]. GeoInformatica, 2002, 6(2):153-180. |