[1] |
MAYER J, MUTCHLER P, MITCHELL J C. Evaluating the Privacy Properties of Telephone Metadata[J]. Proceedings of the National Academy of Sciences, 2016, 113(20):5536-5541.
doi: 10.1073/pnas.1508081113
|
[2] |
DE MONTJOYE Y A. Computational Privacy:Towards Privacy-Conscientious Uses of Metadata[D]. Cambridge City: Massachusetts Institute of Technology, 2015.
|
[3] |
JIANG L, LI T, LI X, et al. Anonymous Communication via Anonymous Identity-Based Encryption and its Application in IoT[J]. Wireless Communications and Mobile Computing, 2018, 2018:1-8.
|
[4] |
CHAUM D, DAS D, JAVANI F, et al. cMix:Mixing with Minimal Real-Time Asymmetric Cryptographic Operations[C]// International Conference on Applied Cryptography and Network Security.Heidelberg:Springer, 2017:557-578.
|
[5] |
徐花, 田有亮. 差分隐私下的权重社交网络隐私保护[J]. 西安电子科技大学学报, 2022, 49(1):17-25.
|
|
XU Hua, TIAN Youliang. Protection of Privacy of the Weighted Social Network under Differential Privacy[J]. Journal of Xidian University, 2022, 49(1):17-25.
|
[6] |
JAYARAMAN I, STANISLAUS PANNEERSELVAM A. A Novel Privacy Preserving Digital Forensic Readiness Provable Data Possession Technique for Health Care Data in Cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12(5):4911-4924.
doi: 10.1007/s12652-020-01931-1
|
[7] |
SILVA P, CASALEIRO R, SIMÖES P, et al. Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform[J]. SN Computer Science, 2020, 1(4):1-10.
doi: 10.1007/s42979-019-0007-y
|
[8] |
WANG X, XU Z, CAI Z, et al. Novel Temporal Perturbation-Based Privacy-Preserving Mechanism for Smart Meters[J]. Mobile Networks and Applications, 2020, 25(4):1548-1562.
doi: 10.1007/s11036-019-01359-8
|
[9] |
左开中, 刘蕊, 赵俊, 等. 融合语义信息的时空关联位置隐私保护方法[J]. 西安电子科技大学学报, 2022, 49(1):67-77.
|
|
ZUO Kaizhong, LIU Rui, ZHAO Jun, et al. Method for the Protection of Spatiotemporal Correlation Location Privacy with Semantic Information[J]. Journal of Xidian University, 2022, 49(1):67-77.
|
[10] |
LI F, LIU Z, WANG Y, et al. Aitac:An Identity-Based Traceable Anonymous Communication Model[J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13:1353-1362.
doi: 10.1007/s12652-020-02604-9
|
[11] |
LI Y, WANG G, NIE L, et al. Distance Metric Optimization Driven Convolutional Neural Network for Age Invariant Face Recognition[J]. Pattern Recognition, 2018, 75:51-62.
doi: 10.1016/j.patcog.2017.10.015
|
[12] |
LI J, ZHANG Y, CHEN X, et al. Secure Attribute-Based Data Sharing for Resource-Limited Users in Cloud Computing[J]. Computers & Security, 2018, 72:1-12.
doi: 10.1016/j.cose.2017.08.007
|
[13] |
CORRIGAN-GIBBS H, WOLINSKY D I, FORD B. Proactively Accountable Anonymous Messaging in Verdict[C]// 22nd USENIX Security Symposium (USENIX Security 13). New York: ACM, 2013:147-162.
|
[14] |
SUN Q, LIN K, SI C, et al. A Secure and Anonymous Communicate Scheme over the Internet of Things[J]. ACM Transactions on Sensor Networks (TOSN), 2022, 18(3):1-21.
|
[15] |
DIAB T, GILG M, LORENZ P, et al. Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets:I2P Vehicular Protocol(IVP)[J]. Wireless Personal Communications, 2022, 127:2625-2644.
doi: 10.1007/s11277-022-09888-4
|
[16] |
MARIA A, RAJASEKARAN A S, AL-TURJMAN F, et al. Baiv:An Efficient Blockchain-Based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs[J]. Electronics, 2022, 11(3):488.
doi: 10.3390/electronics11030488
|
[17] |
BUCCAFURRI F, DE ANGELIS V, IDONE M F, et al. A Protocol for Anonymous Short Communications in Social Networks and its Application to Proximity-Based Services[J]. Online Social Networks and Media, 2022, 31:100221.
doi: 10.1016/j.osnem.2022.100221
|
[18] |
CHAUM D L. Untraceable Electronic Mail,Return Addresses,and Digital Pseudonyms[J]. Communications of the ACM, 1981, 24(2):84-90.
doi: 10.1145/358549.358563
|
[19] |
CHAUM D. The Dining Cryptographers Problem:Unconditional Sender and Recipient Untraceability[J]. Journal of Cryptology, 1988, 1(1):65-75.
doi: 10.1007/BF00206326
|
[20] |
DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor:The Second-Generation Onion Router[R]. Washington DC: Naval Research Lab, 2004.
|
[21] |
HILLER J, PENNEKAMP J, DAHLMANNS M, et al. Tailoring Onion Routing to the Internet of Things:Security and Privacy in Untrusted Environments[C]// 2019 IEEE 27th International Conference on Network Protocols (ICNP).Piscataway:IEEE, 2019:1-12.
|
[22] |
XIA Y, CHEN R, SU J, et al. Balancing Anonymity and Resilience in Anonymous Communication Networks[J]. Computers & Security, 2021, 101:102106.
doi: 10.1016/j.cose.2020.102106
|
[23] |
BAUER K, MCCOY D, GRUNWALD D, et al. Low-Resource Routing Attacks Against Tor[C]// Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society. New York: ACM, 2007:11-20.
|