JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 69-73.doi: 10.6040/j.issn.1671-9352.2.2014.065
Previous Articles Next Articles
YANG Song-tao1,2, MA Chun-guang1, ZHOU Chang-li1, ZHANG Zong-li2
CLC Number:
[1] CHOW C, MOKBEL M F, AREF W G. Casper*: query processing for location services without compromising privacy [J]. ACM Transactions on Database Systems, 2009, 34(4):24-48. [2] KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12):1719-1733. [3] 黄毅,霍峥,孟小峰. CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报,2011, 34(10): 1976-1985. HUANG Yi, HUO Zheng, MENG Xiaofeng. CoPrivacy: a collaborative location privacy-preserving method without cloaking region [J].Chinese Journal of Computers, 2011, 34(10): 1976-1985. [4] 彭志宇,李善平. 移动环境下LBS位置隐私保护[J].电子与信息学报,2011(5): 1211-1216. PENG Zhiyu, LI Shanping. Protecting location privacy in location-based services in mobile environments [J]. Journal of Electronics & Information Technology, 2011, (5):1211-1216. [5] TRUJILLO-RASUA R, DOMINGO-FERRER J. On the privacy offered by (k, delta)-anonymity [J]. Information Systems, 2013, 38(4, SI):491-494. [6] PAPADOPOULOS S, BAKIRAS S, PAPADIAS D. Nearest neighbor search with strong location privacy [J]. Proc VLDB Endow, 2010, 3(1-2): 619-629. [7] LIU Yubao, CHEN Xiuwei, LI Zhijie, et al. An efficient method for privacy preserving location queries [J]. Frontiers of Computer Science, 2012, 6(4): 409-420. [8] UM J, KIM Y, LEE H. k-nearest neighbor query processing algorithm for cloaking regions towards user privacy protection in location-based services[J]. Journal of Systems Architecture, 2012, 58(9): 354-371. [9] GHINITA G, KALNIS P, KHOSHGOZARAN A. Private queries in location-based services: anonymizers are not necessary[C]//Proceedings of 2008 ACM SIGMOD international conference on Management of data. Vancouver: ACM, 2008:121-132. [10] LI Ming, YU Shucheng, CAO Ning,et al. Privacy-preserving distributed profile matching in proximity-based mobile social networks [J]. IEEE Transactions on Wireless Communications, 2013, 12(5): 2024-2033. [11] WU Liang, JING Yaping.The protection algorithm of personal privacy information in sensors network [J].Sensor Letters, 2013, 11(4): 726-730. [12] LIEN I-ting, LIN Yu-hsun, SHIEH Jyh-ren,et al. A novel privacy preserving location-based service protocol with secret circular shift for k-NN search [J].IEEE Transactions on Information Forensics and Security, 2013, 8(6, SI): 863-873. [13] LI Fengjun, LUO Bo, LIU Peng,et al. Enforcing secure and privacy-preserving information brokering in distributed information sharing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6, SI): 888-900. |
[1] | YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22. |
[2] | JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68. |
[3] | XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45. |
[4] | ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50. |
[5] | CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59. |
[6] | LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64. |
[7] | LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70. |
[8] | RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76. |
[9] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[10] | MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18. |
[11] | TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45. |
[12] | SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52. |
[13] | SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94. |
[14] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[15] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
|