[1] Duri S, Gruteser M, Liu X, et al. Framework for Security and Privacy in Automotive Telematics[C]//Proceedings of the 2nd International Workshop on Mobile Commerce. New York: ACM, 2002: 25-32.
[2] Wang Y, Xu D, He X. L2P2: Location-aware Location Privacy Protection for Location-based Services[C]//Proceedings of IEEE INFOCOM. Piscataway: IEEE, 2012: 1996-2004.
[3] Wang Q, Xu Z, Qu S. An Enhanced K-Anonymity Model Against Homogeneity Attack[J]. Journal of Software, 2011, 6(10): 1945-1952.
[4] Gruteser M, Grunwald D. Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM, 2003: 31-42.
[5] Beresford A R, Stajano F. Location Privacy in Pervasive Computing[J]. IEEE Pervasive Computing, 2003, 2(1): 46-55.
[6] Kim M, Fielding J J, Kotz D. Risks of Using AP Locations Discovered through War Driving in Pervasive Computing[M]. Berlin: Springer, 2006: 67-82.
[7] Xu T, Cai Y. Exploring Historical Location Data for Anonymity Preservation in Location-based Services[C]//Proceedings of the 27th IEEE Communications Society Conference on Computer Communications. Piscataway: IEEE, 2008: 1220-1228.
[8] Chow C Y, Mokbel M F. Trajectory Privacy in Location-based Services and Data Publication[J]. ACM SIGKDD Explorations Newsletter, 2011, 13(1): 19-29.
[9] Suzuki A, Iwata M, Arase Y, et al. A User Location Anonymization Method for Location Based Services in a Real Environment[C]//Proceedings of the 18th ACM International Symposium on Advances in Geographic Information Systems. New York: ACM, 2010: 398-401.
[10] Kato R, Iwata M, Hara T, et al. A Dummy-based Anonymization Method Based on User Trajectory with Pauses[C]//Proceedings of the 20th ACM International Symposium on Advances in Geographic Information Systems. New York: ACM, 2012: 249-258.
[11] Yigitoglu E, Damiani M L, Abul O. Privacy-preserving Sharing of Sensitive Semantic Locations under Road-network Constraints[C]//Proceedings of the 13th IEEE International Conference on Mobile Data Management. Washington: IEEE Computer Society, 2012: 186-195.
[12] Pan X, Xu J, Meng X. Protecting Location Privacy against Location-dependent Attacks in Mobile Services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8): 1506-1519.
[13] Karimi H A, Liu X. A Predictive Location Model for Location-based Services[C]//Proceedings of the 11th ACM International Symposium on Advances in Geographic Information Systems. New York: ACM, 2003: 126-133.
[14] Thomas Brinkhoff: Network-based Generator of Moving Objects[EB/OL]. [2014-05-20]. http://iapg.jade-hs.de/personen/brinkhoff/generator/. |