Computer Science ›› 2013, Vol. 40 ›› Issue (7): 116-120.
Previous Articles Next Articles
ZHAO Ping,MA Chun-guang,GAO Xun-bing and ZHU Wei
[1] Freudiger J,Shokri R,Hubaux J-P.Evaluating the Privacy Risk of Location-Based Services[A]∥15th International Conference on Financial Cryptography and Data Security[C].Gros Islet,St.Lucia,2012:31-46 [2] Cvrcek D,Kumpost M,Matyas V,et al.A study on the value of location privacy[A]∥WPES ’06:Proceedings of the 5th ACM workshop on Privacy in electronic society[C].New York,USA:ACM,2006:109-118 [3] Gruteser M,Grunwald D.Anonymous usage of location-based servicesthrough spatial and temporal cloaking[A]∥Proceedings of the 1st International Conference on Mobile Systems,Applicatio-ns and Services[C].San Francisco,USA:ACM,2003:163-168 [4] Sweeney L.k-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570 [5] Mokbel M F,Chow C Y.Casper*:query processing for location services without compromising privacy[J].ACM Transactions on Data Systems,2009,34(4):24-48 [6] Machanavajjhala A,Kifer D,Gehrke J,et al.l-diversity:Privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3 [7] Gedik B,Liu L.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[A]∥IEEE Transactions on Mobile Computing[C].California,USA,2008:1-18 [8] Shin K G,Ju X,Chen Z,et al.Privacy protection for users of location-based services[J].IEEE Communications Society,2012,19(1):30-39 [9] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location-based identity inference in anonymous spatial queries[J].Knowledge and Data Engineering,2007,19(12):1719-1733 [10] Wang Ting,Liu Ling.Privacy-aware mobile services over road networks[J].VLDB Endowment,2009,2(1):1042-1053 [11] 徐建,徐明,林欣.路网限制环境中基于匿名蜂窝的位置隐私保护[J].浙江大学学报,2011,5(3):429-434 [12] 薛姣,刘向宇,杨晓春.一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,4(5):865-878 [13] 魏琼,卢炎生.位置隐私保护技术研究进展[J].计算机科学,2008,5(9):21-25 [14] Wu Xiao-jun,Luo Xue-fang.The Algorithm for Creating Weighted Voronoi Diagrams based on Cellular Automata[A]∥The 6th World Congress on Intelligent Control and Automation[C].Dalian China:Luo Xue-fang,2006:4630-4633 [15] Brinkhoff T.Network-based generator of moving objects[A]∥Proceedings of the 12th International Conference on Scientific and Statistical Database Management[C].Oldenburg,Germany,2000:253-255 |
No related articles found! |
|