[1] T H Hollerer, S K Feiner.Mobile Augmented reality[M]. Britain: Taylor and Francis Books Ltd, 2004. [2] Wikipedia. Augmented reality. [EB/OL]. (2010) [2011]. http://en.wikipedia.org/wiki/Augmented reality [3] Mokbel MF.Privacy in location-based services:start- of-the-art and research directions[C]// Proceeding of 8th International Conference on Mobile Data Management (MDM07’), 2007. Mannheim, Germany: IEEE Computer Society, 2007: 228-229. [4] Northstream. (2001) Location based services: considerations and challenges. [EB/OL]. (2012) [2013]. http://www. palowireless.com/lbs/docs/LocationBasedServices.pdf. [5] Sinha. (2007) Location based services in india: Where are you? [EB/OL]. (2007) [2013]. http://www.pluggd.in/ mobile/location-based-servicesin-indiakey-players-bsnl-msn-airtel-906/ [6] Alastair R Beresford, Frank Stajano.Location privacy in pervasive computing[J]. Pervasive Computing (S1536-1268), 2003, 2(1): 46-55. [7] A Mohaisen, D Hong, D Nyang.Privacy in location based services: Primitives toward the solution[C]// Fourth Int’l Conf, Networked Computing and Advanced Information Management. Korea: IEEE Computer Society, 2008, 1: 572-579. [8] P S L M Barreto, V Rijmen. The Anubis block cipher[C]// First Open NESSIE Workshop. Belgium: NESSIE Consortium, 2000, 11: 13-14. [9] Sweeney L.K-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems (S0218-4885), 2002, 10(5): 557-570. [10] Samarati P, Sweeney L.Generalizing data to provide anonymity when disclosing information (Abstract) [C]// Proceedings of the Seventeenth ACM Sigact-Sigmod- Sigart Symposium on Principles of Database Systems. New York, USA: ACM Press, 1998: 188. [11] Sweeney L.K-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems (S0218-4885), 2002, 10(5): 557-570. [12] Sweeney L.Achieving k-Anonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems (S0218-4885), 2002, 10(5): 571-588. [13] Machanavajjhala A, Gehrke J, Kifer D, et al. L-diversity: Privacy beyond k-anonymity[C]// Proceedings of the 22nd ICDE. Atlanta, USA: ACM, 2006: 24-35. [14] B Gedik, L Liu.Protecting location privacy with personalized kanonymity: Architecture and algorithms[J]. IEEE Trans. Mobile Computing (S1536-1233), 2008, 9(1): 1-17. [15] U D of the Interior. (2003) US Geological Survey [EB/OL]. (2003) [2012]. http://www.usgs.gov/ [16] M-C M. Center. (2003) Spatial data transfer format. [EB/OL]. (2003) [2012]. http://mcmcweb.er.usgs.gov/sdts/ [17] William E Winkler.Using simulated annealing for k-anonymity [R]// Research Report. Washington, USA: US Census Bureau, 2002, 07: 2-20. |