[1]CHOW C Y, MOKBEL M F. Queryaware location anonymization for road networks[J]. Geoinformatica. 2011, 15(3):571607.[2]周傲英, 杨彬, 金澈清, 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011, 34(7):11551171.[3]霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报,2011.34(10):18201830.[4]KIDO H, YANAGISAWA Y, SATOH T. Protection of location privacy using dummies for locationbased services[C]The 21st International Conference on Data Engineering Workshops.2005:1084.[5]YOU T, PENG W, LEE W. Protecting moving trajectories with dummies[C]2007 International Conference on Mobile Data Management. Mannheim: IEEE, 2007: 278282.[6]SWEENEY L. kanonymity: A model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 2002, 10(5):557570.[7]TERROVITIS M, MAMOULIS N. Privacy preserving in the publication of trajectories[C]Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008). Beijing: 2008:6572.[8]ABUL O, ATZORI M, BONCHI F, et al. Hiding sensitive trajectory patterns[C]Proceedings of the 7th IEEE International Conference on Data Mining Workshops (ICDMW 2007). Singapore: 2007: 693698.[9]GRUTESER M, LIU X. Protecting privacy in continuous locationtracking applications[J]. IEEE Security and Privacy, 2004, 2(2): 2834.[10]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for location based services[C]Proceedings of the 21st International Conference on Data Engineering Workshops. 2005:1248.[11]BRINKHOFF T. Generating networkbased moving objects[C]The 12th International Conference on Scientific and Statistical Database Management. Washington: IEEE Computer Society, 2000:253255. |