Related references
Note: Only part of the references are listed.Location privacy: going beyond K-anonymity, cloaking and anonymizers
Ali Khoshgozaran et al.
KNOWLEDGE AND INFORMATION SYSTEMS (2011)
A strip-splitting-based optimal algorithm for decomposing a query window into maximal quadtree blocks
YH Tsai et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2004)
Location privacy in pervasive computing
AR Beresford et al.
IEEE PERVASIVE COMPUTING (2003)
An efficient and practical solution to remote authentication: Smart card
HY Chien et al.
COMPUTERS & SECURITY (2002)
Analysis of the clustering properties of the Hilbert space-filling curve
B Moon et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2001)