[1]Gredik B,Liu Ling.A customizable k-anonymous model for protecting location privacy[C]∥Proc of the 25th International Conference on Distributed Computing Systems(ICDCS’05),2005:620-629.
[2]Gedik B,Liu Ling.Protecting location privacy with personalized k-anonymous:Architecture and algorithms [J].IEEE Transactions on Mobile Computing,2007,7(1):1-18.
[3]Bamba B,Liu Ling.PrivacyGrid:Supporting anonymous location queries in mobile environments with privacygrid[C]∥Proc of the 8th International Conference on Word Wide Wed (WWW’08),2008:237-246.
[4]Xiao Yan-fang,Xu Hong-yun.A location privacy protection method based on anonymous region transformation[J].Computer Engineering,2013,39(1):157-163.(in Chinese)
[5]Ye A-yong,Li Ya-cheng,Ma Jian-feng,et al.Location privacy-preserving method of K-anonymous based on service similarity[J].Journal of Communications,2014,35(11):162-170.(in Chinese)
[6]Yang Song-tao,Ma Chun-guang,Zhou Chang-li.LBS-oriented location privacy protection model and scheme[J].Journal of Communications,2014,35(8):116-124.(in Chinese)
[7]Chow C Y,Mokbel M F,Liu Xuan.Spatial cloaking for anonymous location based services in mobile peer-to-peer environments[J].GeoInformatica,2011,15(2):351-380.
[8]Che Yan-zhe,Chiew K,Hong Xiao-yan,et al.EDA:An enhanced dual-active algorithm for location privacy preservation in mobile P2P networks[J].Journal of Zhejiang University-SCIENCE,2013,14(5):356-373.
[9]Huang Yi, Huo Zheng, Meng Xiao-feng. Coprivacy:A collabrative location privacy-preserving method without cloaking region[J].Journal of Computers,2011,34(10):1975-1985.(in Chinese)
[10]Chow C Y,Mokbel M F,Liu Xuan.A peer-to-peer spatial cloaking algorithm for anonymous location-based services[C]∥Proc of the 14th ACM International Symposium on Advances in Geographic Information Systems(GIS’06),2006:171-178.
[11]Ghinita G,Kalnis P,Dopoulos S.MobiHide:A mobile peer-to-peer system for anonymous location-based queries[C]∥Proc of the 10th International Symposium on Advances in Spatial and Temporal Databases(SSTD’07),2007:221-238.
[12]Liu Ling.From data privacy to location privacy:Models and algorithms[C]∥Proc of the 33th International Conference on Very Large Data Bases (VLDB’07),2007:1429-1430.
[13]Zhang Cheng-yang,Huang Yan.Cloaking location for anonymous location-based services:A hybrid approach[J].GeoInformatica,2009,13(2):159-182.
[14]Yang Nian-hua,Cao Yu-ru,Liu Qiong.A novel personalized TTP-free location privacy-preserving method[J].International Journal of Security & Its Applications,2014,8(2):387-399.
[15]Yiu M L,Jensen C S,Huang Xue-gang,et al.SpaceTwist:Managing the trade-offs among location privacy,query performance and query accuracy in mobile service[C]∥Proc of the IEEE 24th International Conference on Data Engineering(IDCE’08),2008:366-375.
[16]Brinkoff T. A framework for generating network based moving objects[J].GeoInformatica,2002,6(2):153-180.
附中文参考文献:
[4]肖燕芳,徐红云.一种基于匿名区域变换的位置隐私保护方法[J].计算机工程,2013,39(1):157-163.
[5]叶阿勇,李亚成,马建峰,等.基于服务相似性的K-匿名位置隐私保护方法[J].通信学报,2014,35(11):162-169.
[6]杨松涛,马春光,周长利.面向LBS的隐私保护模型及方案[J].通信学报,2014,35(8):116-124.
[9]黄毅,霍峥,孟小峰.CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J].计算机学报,2011,34(10):1976-1985. |