[1] |
Junglas I A, Watson R T.Location-based services[J]. Communications of the ACM, 2008, 51(3): 65-69.
|
[2] |
Xu T, Cai Y.Feeling-based location privacy protection for location-based services[C]//Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009: 348-357.
|
[3] |
Squicciarini A, Paci F, Sundareswaran S.PriMa: an effective privacy protection mechanism for social networks[C]//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010: 320-323.
|
[4] |
Kido H, Yanagisawa Y, Satoh T.An anonymous communication technique using dummies for location-based services[C]//Pervasive Services, 2005. ICPS'05.Proceedings. International Conference on.IEEE, 2005: 88-97.
|
[5] |
Yiu M L, Jensen C S, Huang X, et al.Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services[C]//Data Engineering, 2008. ICDE 2008.IEEE 24th International Conference on.IEEE, 2008: 366-375.
|
[6] |
Gedik B, Liu L.Protecting location privacy with personalized k-anonymity: Architecture and algorithms[J]. Mobile Computing, IEEE Transactions on, 2008, 7(1): 1-18.
|
[7] |
Zhou B, Pei J.Preserving privacy in social networks against neighborhood attacks[C]//Data Engineering, 2008.ICDE 2008.IEEE 24th International Conference on. IEEE, 2008: 506-515.
|
[8] |
Chow C Y, Mokbel M F, Liu X.A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]//Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. ACM, 2006: 171-178.
|
[9] |
陈洌, 冯云霞, 戴国骏. LBS 中基于移动终端的连续查询用户轨迹隐匿方法[J]. 计算机应用研究, 2011, (12):4653-4656.
|
[10] |
XU T, CAI Ying.Exploring historical location data for anonymity preservation in location-based services[C]//Proc of the 27th International Conference on Computer Communication.[S.L.]: IEEE Press,2008: 547-555.
|
[11] |
HUANG Le-ping, MATSUURA K, YAMANE H, et al.Enhancing wireless location privacy using silent period[C]//Proc of IEEE Wireless Communications and Networking Conference. [S.L.]: IEEE. Press, 2005: 1187-1192.
|
[12] |
GRUTESER M F, GRUNMALD D.Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proc of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM Press, 2003: 81-84.
|
[13] |
Chow C Y, Mokbel M F, Aref W G.Casper*: Query processing for location services without compromising privacy[J]. ACM Transactions on Database Systems (TODS), 2009, 34(4): 24-48.
|
[14] |
Bamba B, Liu L, Pesti P, et al.Supporting anonymous location queries in mobile environments with privacygrid[C]//Proceedings of the 17th international conference on World Wide Web. ACM, 2008: 237-246.
|
[15] |
刘来福,黄海洋,曾文艺.数学模型与数学建模[M],北京:北京师范大学出版社,2010.
|
[16] |
杨桂元,黄己立.数学建模[M].合肥:中国科学技术大学出版社,2008.
|
[17] |
Saaty T L.A scaling method for priorities in hierarchical structures[J]. Journal of mathematical psychology, 1977, 15(3): 234-281.
|