共 26 条
- [1] Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
- [2] [Anonymous], P SIMUTOOLS
- [3] [Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
- [4] Peer-to-Peer Secure Multi-Party Numerical Computation [J]. P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 257 - +
- [5] Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
- [6] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
- [7] Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47
- [8] Ganti RK, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P281
- [9] Grim E., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P475, DOI 10.1109/PerComW.2012.6197539
- [10] Protecting location privacy through path confusion [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 194 - 205