[1] Benisch M, Kelley P G, Sadeh N, et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs[J]. Personal and Ubiquitous Computing, 2011, 15(7): 679-694.[2] Zhou Tao. The impact of privacy concern on user adoption of location-based services [J]. Industrial Management and Data Systems, 2011, 111(1): 212-226.[3] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//2003 International Conference on Mobile Systems, Applications and Services. San Francisco, California: ACM, 2003: 31-42.[4] Chow C, Mokbel M F, Aref W G. Casper*: query processing for location services without compromising privacy[J]. ACM Transactions on Database Systems, 2009, 34(4): 24-48.[5] Bamba B, Liu Ling, Pesti P, et al. Supporting anonymous location queries in mobile environments with privacygrid[C]//2008 International Conference on World Wide Web. Beijing, China: ACM, 2008: 237-246.[6] Lee B, Oh J, Yu H, et al. Protecting location privacy using location semantics[C]//2011 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. San Diego, California: ACM, 2011: 1289-1297.[7] Xu T, Cai Ying. Feeling-based location privacy protection for pocation-based services[C]//2009 ACM Conference on Computer and Communications Security. Chicago, Illinois: ACM, 2009: 348-357.[8] Chow C Y, Mokbel M F, Liu Xuan. A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]//2006 ACM International Symposium on Advances in Geographic Information Systems. Arlington: ACM, 2006: 171-178.[9] Ghinita G, Kalnis P, Skiadopoulos S. PRIVE: anonymous location-based queries in distributed mobile systems[C]//2007 International Conference on World Wide Web. New York: ACM, 2007: 371-380.[10] Li Wei, Liu Chunlei. A decentralized location-query-sensitive cloaking algorithm for LBS[C]//2012 IEEE International Wireless Communications and Mobile Computing Conference. Limassol, Cyprus: IEEE, 2012: 1040-1045.[11] Ghinita G, Kalnis P, Khoshgozaran A, et al. Private queries in location-based services: anonymizers are not necessary[C]//2008 ACM SIGMOD International Conference on Management of Data. Vancouver. Canada: ACM, 2008: 121-132.[12] Tzeng W. Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters[J]. IEEE Transactions on Computers, 2004, 53(2): 232-240. |