Computer Science ›› 2018, Vol. 45 ›› Issue (10): 142-149.doi: 10.11896/j.issn.1002-137X.2018.10.027
• Information Security • Previous Articles Next Articles
XIONG Wan-zhu, LI Xiao-yu
CLC Number:
[1]SHIN K G,JU X,CHEN Z,et al.Privacy protection for users of location-based services[J].Wireless Communications IEEE,2012,19(1):30-39. [2]CHAUM D L.Untraceble electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88. [3]SYVERSON P F,GOLDSCHLAG D M,REED M G.Anonymous Connections and Onion Routing[C]∥IEEE Symposium on Security and Privacy.IEEE Computer Society,1997:44. [4]DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the second-generation onion router[C]∥Conference on Usenix Security Symposium.USENIX Association,2004:21. [5]RELTER M K,RUBIN A D.Crowds:Anonymity for web Transactions[J].ACM Transactions on Information and System Security,1998,1(1):62-92. [6]PENG Z Y,LI S P.Protecting Location Privacy in Location- based Services in Mobile Environments[J].Journal of Electroni-cs & Information Technology,2011,33(5):1211-1216.(in Chinese) 彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011,33(5):1211-1216. [7]SWEENEY L.k-ANONYMITY:A Moedl for Protecting Privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570. [8]LUO J,LIAO J G,LI X.LocPriv:a Scheme on Location Privacy Protection Based on Spatial Region Anonymity[J].Smallmicrocomputer Submission,2016,37(6):1273-1278.(in Chinese) 罗健,廖俊国,李雄.LocPriv:一种基于空间区域匿名的位置隐私保护方案[J].小型微型计算机系统,2016,37(6):1273-1278. [9]GKOULALAS-DIVANIS A,KALNIS P,VERYKIOS V S.Providing K-Anonymity in location based services[J].ACM,2010,12(1):3-10. [10]XU H Y,XU J GONG Y J,et al.Algorithms to Generate Location Privacy Protection with Spatial Cloaking[J].Journal of South China University of Technology(Natural Science Edition),2014,42(1):97-103.(in Chinese) 徐红云,许隽,龚羽菁,等.基于空间混淆位置隐私保护的位置隐私区域生成算法[J].华南理工大学学报(自然科学版),2014,42(1):97-103. [11]KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]∥International Conference on Advances in Spatial and Temporal Databases.Springer-Verlag,2007:239-257. [12]LIU X J,CHEN Y F,LI B.Mobile Location Privacy Protection Based on Untrusted Environment[J].Computer Science,2015,42(2):108-113.(in Chinese) 刘学军,陈玉凤,李斌.基于不可信环境的移动位置隐私保护[J].计算机科学,2015,42(2):108-113. [13]HUO Z,MENG X F.A Surey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Comuputers,2011,34(10):1820-1830.(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. [14]MENG X F,PAN X.Privacy Preservation based on Location Services[J].Communications of the CCF,2010,6(6):16-23.(in Chinese) 孟晓峰,潘晓.基于位置服务的隐私保护[J].中国计算机协会通讯,2010,6(6):16-23. [15]HUANG X H.Research on Location Privacy Preservation in Location-based Services[D].Chengdu:University of Electronic Science and Technology of China,2016.(in Chinese) 黄勋辉.基于位置服务的位置隐私保护研究[D].成都:电子科技大学,2016. [16]SEN S,WANG J.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transactions on Networking,2004,12(2):219-232. [17]REITER M K.Crowds:anonymity for Web transactions[J]. Acm Transactions on Information & System Security,1998,1(1):66-92. [18]DIAZ C,CLAESSENS J,PRENEEL B.APES:Anonymity and Privacy in Electronic Services[J].Datenschutz Und Datensicherheit,2005,27(3):143-145. |
[1] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[2] | CHEN Yong-ping, ZHU Jian-qing, XIE Yi, WU Han-xiao, ZENG Huan-qiang. Real-time Helmet Detection Algorithm Based on Circumcircle Radius Difference Loss [J]. Computer Science, 2022, 49(6A): 424-428. |
[3] | SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73. |
[4] | WANG Wen-xuan, HU Jun, HU Jian-cheng, KANG Jie-xiang, WANG Hui, GAO Zhong-jie. Test Case Generation Method Oriented to Tabular Form Formal Requirement Model [J]. Computer Science, 2021, 48(5): 16-24. |
[5] | YANG Zhi-bin, YANG Yong-qiang, YUAN Sheng-hao, ZHOU Yong, XUE Lei, CHENG Gao-hui. Terminology Recommendation and Requirement Classification Method for Safety-critical Software [J]. Computer Science, 2021, 48(5): 32-44. |
[6] | SHI Tie-zhu, QIAN Jun-yan, PAN Hai-yu. Fuzzy Safety and Liveness Properties [J]. Computer Science, 2021, 48(4): 31-36. |
[7] | LUO Chen, HU Ming, XIAO Huan-quan, ZHONG Lin-feng. Research on Behavior of Travel Mode Choice Under Duration of Public Health Emergencies Basedon SEM Model [J]. Computer Science, 2021, 48(11A): 655-658. |
[8] | FU Zhen-hao, LIN Ding-kang, JIANG Hao-chen, YAN Jia-qi. Survey of Anonymous and Tracking Technology in Zerocash [J]. Computer Science, 2021, 48(11): 62-71. |
[9] | JIN Yu-fang, WU Xiang, DONG Hui, YU Li, ZHANG Wen-an. Improved YOLO v4 Algorithm for Safety Helmet Wearing Detection [J]. Computer Science, 2021, 48(11): 268-275. |
[10] | SUN Xiao-xiang, CHEN Zhe. Study on Correctness of Memory Security Dynamic Detection Algorithm Based on Theorem Proving [J]. Computer Science, 2021, 48(1): 268-272. |
[11] | XU Shou-kun, NI Chu-han, JI Chen-chen, LI Ning. Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3 [J]. Computer Science, 2020, 47(8): 233-240. |
[12] | WU Hong-tao, LIU Li-yuan, MENG Ying, RONG Ya-peng and LI Lu-kai. Novel Threat Degree Analysis Method for Scattered ObJects in Road Traffic Based on Dynamic Multi-feature Fusion [J]. Computer Science, 2020, 47(6A): 196-205. |
[13] | FENG An-qi, QIAN Li-ping, OUYANG Jin-yuan, WU Yuan. Vehicular Networking Enabled Vehicle State Prediction with Two-level Quantized AdaptiveKalman Filtering [J]. Computer Science, 2020, 47(5): 230-235. |
[14] | TANG Hong-ying, HU Jun, CHEN Shuo, SHI Meng-ye. System Safety Analysis Tool for SysML and Case Study [J]. Computer Science, 2020, 47(5): 284-294. |
[15] | TANG Min, WANG Dong-qiang, ZENG Xin-yu. Active Safety Prediction Method for Automobile Collision Warning [J]. Computer Science, 2020, 47(4): 318-322. |
|