A reciprocal framework for spatial K-anonymity
Tài liệu tham khảo
Abel, 1984, A B+ tree structure for large quadtrees, Computer Vision, Graphics, and Image Processing, 27, 19, 10.1016/0734-189X(84)90079-3
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving Anonymity via Clustering, PODS, 2006.
A.R. Butz, Alternative Algorithm for Hilbert's Space-Filling Curve, IEEE Transaction on Computers, April 1971.
Bayardo, 2005
Beckmann, 1990
Beresford, 2003, Location privacy in pervasive computing, IEEE Pervasive Computing, 2, 46, 10.1109/MPRV.2003.1186725
C. Bettini, S. Wang, S. Jagodia, Protecting privacy against location-based personal identification. VLDB Workshop on Secure Data Management, 2005.
R. Cheng, Y. Zhang, E. Bertino, S. Prabhakar, Preserving user location privacy in mobile data management infrastructures. Privacy Enhancing Technology Workshop, 2006.
Chow, 2007
Chow, 2006
Gedik, 2005
Ghinita, 2007
Ghinita, 2007
Ghinita, 2008
Gruteser, 2003
Hoh, 2005
Hu, 2006, Range nearest-neighbor query, IEEE TKDE, 18, 78
Iwuchukwu, 2007
Kalnis, 2007, Preventing Location-Based Identity Inference in Anonymous Spatial Queries, IEEE TKDE, 19, 1719
Khoshgozaran, 2007
Kamat, 2005
LeFevre, 2005
LeFevre, 2006
Leutenegger, 1997
Li, 2007
Machanavajjhala, 2006
Mokbel, 2006
Samarati, 2001, Protecting respondents’ identities in microdata release, IEEE TKDE, 13, 1010
Samet, 1990
Tao, 2005, Historical spatio-temporal aggregation, ACM TOIS, 23, 61, 10.1145/1055709.1055713
Xiao, 2006
Xu, 2006
Zhang, 2007
