共 30 条
[2]
Bettini C, 2009, LECT NOTES COMPUTER, V5599
[3]
Bettini Claudio., 2000, TIME GRANULARITIES D
[4]
BISHOP M, 2003, COMPUTER SECURITY AR, pCH32
[6]
Freni D, 2009, LECT NOTES COMPUT SC, V5644, P441, DOI 10.1007/978-3-642-02982-0_36
[8]
Ghinita G., 2009, P 17 ACM SIGSPATIAL, P246, DOI DOI 10.1145/1653771.1653807
[9]
Ghinita G., 2008, P ACM SIGMOD INT C M, P121, DOI DOI 10.1145/1376616.1376631
[10]
Anonymous usage of location-based services through spatial and temporal cloaking
[J].
PROCEEDINGS OF MOBISYS 2003,
2003,
:31-42