[1] |
KRUMM J.Inference Attacks on Location Tracks[J]. IEEE Pervasive Computing,2007(6):127-143.
|
[2] |
WERNKE M, SKVORTSOV P, DÜRR F, et al. A Classification of Location Privacy Attacks and Approaches[J]. Personal & Ubiquitous Computing, 2014, 18(1):163-175.
|
[3] |
武艳娜,赵泽茂. 基于连续位置服务请求的位置匿名方法的研究[J]. 信息网络安全,2015(1):39-44.
|
[4] |
KIDO H, YANAGISAWA Y, SATOH T.An Anonymous Communication Technique Using Dummies for Location-based Services[C]// IEEE. Pervasive Services, 2005. ICPS '05. Proceedings. International Conference on, July 11-14, 2005. Santorini, Greece.NJ:IEEE, 2005:88-97.
|
[5] |
JIA Jinying, ZHANG Fengli.Nonexposure Accurate Location K-anonymity Algorithm in LBS[J]. Scientific World Journal, 2014(3):619357.
|
[6] |
PAN Xiao, MENG Xiaofeng, XU Jianliang.Distortion-based Anonymity for Continuous Queries in Location Based Mobile Services[C]// ACM.ACM Sigspatial International Symposium on Advances in Geographic Information Systems, Acm-Gis 2009, November 4-6, 2009.Seattle, Washington, USA. New York: ACM, 2009:256-265.
|
[7] |
吴莎莎,熊金波,叶帼华,等. 移动互联网环境下基于假位置的位置隐私保护研究[J]. 信息网络安全,2016(10):54-59.
|
[8] |
BAMBA B, LIU Ling. PrivacyGrid: Supporting Anonymous Location Queries in Mobile Environments[EB/OL]. ,2016-10-30.
|
[9] |
CHEN Yukun, JIANG Kai, ZHENG Yu, et al.Trajectory Simplification Method for Location-based Social Networking Services[C]//ACM.International Workshop on Location Based Social Networks, Lbsn 2009, November 3, 2009.Seattle, Washington, USA. New York: ACM, 2009:33-40.
|
[10] |
YE Yang, ZHENG Yu, CHEN Yukun, et al.Mining Individual Life Pattern Based on Location History[C]// IEEE. MDM 2009, Tenth International Conference on Mobile Data Management, May 18-20,2009.Taipei, China, NJ:IEEE,2009:1-10.
|
[11] |
朱义杰,彭长根,李甲帅,等 . 一种结合查询隐私和位置隐私的LBS隐私度量框架[J]. 信息网络安全,2016(2):47-53.
|
[12] |
BERESFORD A R, STAJANO F.Location Privacy in Pervasive Computing[J]. IEEE Pervasive Computing, 2003, 2(1): 46-55.
|
[13] |
BERESFORD A R, STAJANO F.Mix Zones: User Privacy in Location-aware Services[C]//IEEE. PerCom Workshops, March 14-17, 2004. Orlando, Florida,USA.NJ:IEEE, 2004: 127-131.
|
[14] |
MASCETTI S, FRENI D, BETTINI C, et al.Privacy in Geo-social Networks: Proximity Notification with Untrusted Service Providers and Curious Buddies[J]. The VLDB Journal—The International Journal on Very Large Data Bases, 2011, 20(4): 541-566.
|
[15] |
LI Xiangyang, JUNG T.Search Me If You Can: Privacy-preserving Location Query Service[J]. Proceedings - IEEE INFOCOM, 2013, 12(11):2760-2768.
|
[16] |
HUANG L, YAMANE H, MATSUURA K, et al.Towards Modeling Wireless Location Privacy[J]. Lecture Notes in Computer Science, 2005(3856):59-77.
|
[17] |
HUANG L, YAMANE H, MATSUURA K, et al.Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation[M]// Security in Pervasive Computing.Heidelberg: Springer Berlin,2006:165-180.
|
[18] |
王彩梅, 郭亚军, 郭艳华. 位置服务中用户轨迹的隐私度量[J]. 软件学报, 2012, 23(2): 352-360.
|
[19] |
刘西蒙, 马建峰, 熊金波,等. 密文策略的权重属性基加密方案[J]. 西安交通大学学报, 2013, 47(8):44-48.
|