[1]DWORK C. Differential privacy VAN TILBORG H, JAJODIA S. Encyclopedia of Cryptography and Security. New York: Springer, 2011: 338340.[2]XIAO Y H, LI X. Dynamic differential privacy for location based applications[EB/OL].[20150812].http://arxiv.org/abs/1410.5919.[3]SWEENEY L. Achieving kanonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002, 10(5): 571588.[4]PAN X, XU J L, MENG X F. Protecting location privacy against locationdependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8): 15061519.[5]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for locationbased services[C]Proceedings of International Conference on Pervasive Services. IEEE, 2005, 8897.[6]GTZ M, NATH S, GEHRKE J. et al. Privately releasing user context streams for personalized mobile applications[C]Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. ACM, 2012: 289300.[7]CHOW C Y, MOKBEL M F. Trajectory privacy in locationbased services and data publication[J]. ACM SIGKDD Explorations Newsletter, 2011, 13(1): 1929.[8]GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in location based services: Anonymizers are not necessary[C]Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008: 121132.[9]SWEENEY L. kanonymity: A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and KnowledgeBased Systems, 2002, 10(5): 557570.[10]HARA T, ARASE Y, YAMAMOTO A, et al. Location anonymization using real car trace data for location based services[C]Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication. ACM, 2014: 34. |