共 14 条
- [1] Duri S., Gruteser M., Liu X., Et al., Framework for Security and Privacy in Automotive Telematics, Proceedings of the 2nd International Workshop on Mobile Commerce, pp. 25-32, (2002)
- [2] Wang Y., Xu D., He X., L2P2: Location-aware Location Privacy Protection for Location-based Services, Proceedings of IEEE INFOCOM, pp. 1996-2004, (2012)
- [3] Wang Q., Xu Z., Qu S., An Enhanced K-Anonymity Model Against Homogeneity Attack, Journal of Software, 6, 10, pp. 1945-1952, (2011)
- [4] Gruteser M., Grunwald D., Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking, Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31-42, (2003)
- [5] Beresford A.R., Stajano F., Location Privacy in Pervasive Computing, IEEE Pervasive Computing, 2, 1, pp. 46-55, (2003)
- [6] Kim M., Fielding J.J., Kotz D., Risks of Using AP Locations Discovered through War Driving in Pervasive Computing, pp. 67-82, (2006)
- [7] Xu T., Cai Y., Exploring Historical Location Data for Anonymity Preservation in Location-based Services, Proceedings of the 27th IEEE Communications Society Conference on Computer Communications, pp. 1220-1228, (2008)
- [8] Chow C.Y., Mokbel M.F., Trajectory Privacy in Location-based Services and Data Publication, ACM SIGKDD Explorations Newsletter, 13, 1, pp. 19-29, (2011)
- [9] Suzuki A., Iwata M., Arase Y., Et al., A User Location Anonymization Method for Location Based Services in a Real Environment, Proceedings of the 18th ACM International Symposium on Advances in Geographic Information Systems, pp. 398-401, (2010)
- [10] Kato R., Iwata M., Hara T., Et al., A Dummy-based Anonymization Method Based on User Trajectory with Pauses, Proceedings of the 20th ACM International Symposium on Advances in Geographic Information Systems, pp. 249-258, (2012)