共 16 条
[1]
Fang W., Ren J., Xia H., Heterogeneous distributed linear regression privacy-preserving modeling , Journal of Computer Research and Development, 48, 9, pp. 1685-1692, (2011)
[2]
Yang Q., Alvin L., Ruan X.J., Et al., Location privacy protection in contention based forwarding for VANETs, Proc of the 53rd IEEE Global Communications Conf, pp. 1-5, (2010)
[3]
Chow C.Y., Mokbel M.F., Liu X., Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , GeoInformatica, 15, 2, pp. 351-380, (2011)
[4]
Huo Z., Meng X., A survey of trajectory privacy-preserving techniques, Chinese Journal of Computers, 34, 10, pp. 1820-1830, (2011)
[5]
Xiao R.Y., Survey on anonymity in unstructured peer-to-peer systems , Journal of Computer Science and Technology, 23, 4, pp. 660-671, (2008)
[6]
Chaum D., Untraceable electronic return addresses, and digital pseudonyms , Communications of the ACM, 24, 2, pp. 84-90, (1981)
[7]
Goldschlag D., Reed M., Syverson P., Onion routing , Communications of the ACM, 42, 2, pp. 39-41, (1999)
[8]
Li X., Xu Z., Zhang X., Low-cost and reliable mutual anonymity protocols in peer-to-peer networks , IEEE Trans on Parallel and Distributed Systems, 14, 9, pp. 829-840, (2003)
[9]
Sherwood R., Bhattacharjee B., Srinivasan A., P5: A protocol for scalable anonymous communication , Journal of Computer Security, 13, 6, pp. 839-876, (2002)
[10]
Jens H.W.J., Christina O., Protecting privacy during peer-to-peer exchange of medical documents , Information Systems Frontiers, 14, 1, pp. 87-104, (2012)