相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Location privacy: going beyond K-anonymity, cloaking and anonymizers
Ali Khoshgozaran et al.
KNOWLEDGE AND INFORMATION SYSTEMS (2011)
A strip-splitting-based optimal algorithm for decomposing a query window into maximal quadtree blocks
YH Tsai et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2004)
Location privacy in pervasive computing
AR Beresford et al.
IEEE PERVASIVE COMPUTING (2003)
An efficient and practical solution to remote authentication: Smart card
HY Chien et al.
COMPUTERS & SECURITY (2002)
Analysis of the clustering properties of the Hilbert space-filling curve
B Moon et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2001)