Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy
暂无分享,去创建一个
[1] Ling Liu,et al. A Customizable k-Anonymity Model for Protecting Location Privacy , 2004 .
[2] D. Hilbert. Ueber die stetige Abbildung einer Line auf ein Flächenstück , 1891 .
[3] H. Sagan. Space-filling curves , 1994 .
[4] Marco Gruteser,et al. USENIX Association , 1992 .
[5] X. S. Wang,et al. Preserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated , 2007 .
[6] H. V. Jagadish,et al. Analysis of the Hilbert Curve for Representing Two-Dimensional Space , 1997, Inf. Process. Lett..
[7] Francesco Pinciroli,et al. A Peano-Hilbert derived algorithm for compression of angiocardiographic images , 1991, [1991] Proceedings Computers in Cardiology.
[8] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[9] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[10] David P. Woodruff,et al. Polylogarithmic Private Approximations and Efficient Matching , 2006, TCC.
[11] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[12] Christos Faloutsos,et al. Analysis of the Clustering Properties of the Hilbert Space-Filling Curve , 2001, IEEE Trans. Knowl. Data Eng..
[13] Helmut Hasse,et al. Number Theory , 2020, An Introduction to Probabilistic Number Theory.
[14] Friedberg Ck. Computers in cardiology. , 1970 .
[15] Pericles S. Theocaris. Number theory in science and communication , 1986 .
[16] Peter Buneman,et al. Semistructured data , 1997, PODS.
[17] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[18] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[19] Peter J. H. King,et al. Querying multi-dimensional data indexed using the Hilbert space-filling curve , 2001, SGMD.
[20] H. V. Jagadish,et al. Linear clustering of objects with multiple attributes , 1990, SIGMOD '90.
[21] Hosagrahar V. Jagadish,et al. Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data, Atlantic City, NJ, May 23-25, 1990. , 1990, SIGMOD 1990.
[22] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[23] Christos Faloutsos,et al. Fractals for secondary key retrieval , 1989, PODS.
[24] D. Hilbert. Über die stetige Abbildung einer Linie auf ein Flächenstück , 1935 .
[25] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[26] Mohamed F. Mokbel,et al. Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).