Computer Science ›› 2015, Vol. 42 ›› Issue (4): 101-105.doi: 10.11896/j.issn.1002-137X.2015.04.019
Previous Articles Next Articles
LIU Shu-bo, LI Yan-min and LIU Meng-jun
[1] Leitner M,Curtis .A first step towards a framework for presenting the location of confidential point data on maps-results of an empirical perceptual study[J].International Journal of Geographical Information Science,2006,20(7):813-822 [2] Shankar P,Ganapathy V,Iftode L.Privately querying location-based services with Sybilquery[C]∥Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp,ACM).2009:31-40 [3] Chang Wei,Wu Jie,Tan Chiu-Chiang .Enhancing mobile social network privacy[C]∥Proceedings of the IEEE Global Communications Conference (Globecom).2011:1-5 [4] Wei Wei,Xu Feng-yuan,Li Qun.Flexible Privacy-preserving location sharing in mobile online social networks[C]∥Procee-dings of the 31st IEEE International Conference on Computer Communications (INFOCOM).2012:2616-2620 [5] Gedik B,Liu Ling.Location privacy in mobile systems:A per-sonalized anonymization model[C]∥Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS).2005:620-629 [6] Chow Chi-Yin,Mokbel M F,Walid G.The new Casper:Query processing for location services without compromising privacy[C]∥Proceedings of the 32nd International Conference on Ver Large Data Base.2006:763-774 [7] Chow Chi-Yin,Mokbel M F,He Tian.A privacy-preserving location monitoring system for wireless sensor networks[J].IEEE Transactions on Mobile Computing,2010:94-107 [8] Chow Chi-Yin,Mokbel M F,Leong V.On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments[J].IEEE Transactions on Mobile Computing,2011,10(10):1473-1487 [9] Beresford A R,Stajano F.Location privacy in pervasive computing[J].IEEE Pervasive Computing,2003,2(1):46-55 [10] Pfitzmann A,Kohntopp M.Anonymity,unobservability,andpseudonymity-a proposal for terminology[C]∥Designing privacy enhancing technologies.2001:1-9 [11] Dingledine R,Mathewson N,Syverson P.Tor:The second-generation onion router[C]∥Proceedings of the 13th USENIX Security Symposium (Security’04).2004:303-320 [12] Chow Chi-Yin,Mokbel M F,Liu Xuan.A peer-to-peer spatialcloaking algorithm for anonymous location-based services[C]∥Proc of the 14th ACM International Symposium on Advances in Geographic Information Systerms.NewYork:ACM Press,2006:171-178 [13] Mokbel M F,Chow Chi-Yin,Aref W G.The new casper:aprivacy-aware location-based database server.http://www-users.cs.umn.edu [14] Ghinita G,Kalnis P,Skiadopoulos S.A mobile peer-to-peer system for anomymous location-based queries[C]∥Proc.of the 10th International Symposium on Advances in Spatial and Temporal Databases.Berlin:Springer-Verlag,2007:519-523 [15] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location- based identity inference in anonymous spatial queries[C]∥IEEE Trans.Knowl.Data Eng..2007:1719-1733 [16] Lu Rong-xing,Lin Xiao-dong,Shi Zhi-guo,et al.PLAM:A privacy-preserving framework for local-area mobile social networks[C]∥Proceedings of the 33st IEEE International Confe-rence on Computer Communications.2014 [17] Niu Ben,Li Qing-hua,Zhu Xiao-yan,et al.Achieving k-anonymity in Privacy-Aware Location-Based Services[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014 [18] Shao Jun,Lu Rong-xing,Lin Xiao-dong.FINE:A fine-grained privacy-preserving location-based service framework for mobile devices[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014 [19] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]∥Proceedings of Eurocrypt.1998,1403:127-144 [20] Wong W K,Cheung D W,Kao B.Secure knn computation on encrypted databases[C]∥Proceedings of the 35th SIGMOD International Conference on Management of Data.2009:139-152 [21] Cao N,Wang C,Li M,et al.Privacy-preserving Multi-keyword ranked search over encrypted cloud data[C]∥IEEE INFOCOM.2011:829-837 |
No related articles found! |
|