共 58 条
[41]
Location privacy through secret sharing techniques
[J].
SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS,
2005,
:614-620
[43]
ProvidentHider: an Algorithm to Preserve Historical k-Anonymity in LBS
[J].
MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT,
2009,
:172-+
[44]
Mokbel M. F., 2007, MOB DAT MAN 2007 INT, P228, DOI DOI 10.1109/MDM.2007.45
[45]
Mokbel MF., 2006, VLDB, P763, DOI DOI 10.1145/1620585.1620591
[46]
Palanisamy B, 2011, PROC INT CONF DATA, P494, DOI 10.1109/ICDE.2011.5767898
[47]
Pedreschi D., 2008, Mobility, Data Mining and Privacy, P101, DOI DOI 10.1007/978-3-540-75177-9_5
[48]
Shankar P, 2009, UBICOMP'09: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, P31
[49]
Quantifying Location Privacy
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:247-262
[50]
Skvortsov Pavel, 2012, Pervasive Computing. Proceedings of the 10th International Conference, Pervasive 2012, P388, DOI 10.1007/978-3-642-31205-2_24