共 26 条
[1]
Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
[2]
[Anonymous], P SIMUTOOLS
[3]
[Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
[4]
Peer-to-Peer Secure Multi-Party Numerical Computation
[J].
P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS,
2008,
:257-+
[5]
Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
[6]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[7]
Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
[8]
Ganti RK, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P281
[9]
Grim E., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P475, DOI 10.1109/PerComW.2012.6197539
[10]
Protecting location privacy through path confusion
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:194-205