A Personalized k-Anonymity with Fake Position Generation for Location Privacy Protection
暂无分享,去创建一个
[1] Meng Xiaofeng. Survey of location privacy-preserving , 2007 .
[2] Jae-Woo Chang,et al. A New K-NN Query Processing Algorithm Enhancing Privacy Protection in Location-Based Services , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.
[3] Hans-Peter Kriegel,et al. The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.
[4] Jianliang Xu,et al. Quality Aware Privacy Protection for Location-Based Services , 2007, DASFAA.
[5] Marco Gruteser,et al. USENIX Association , 1992 .
[6] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[8] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[9] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[10] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..