CHEN L, ZSU M T, ORIA V. Robust and fast similarity search for moving object trajectories[C]Proceedings of the 2005 ACM SIGMOD international conference on Management of data. ACM, 2005: 491502.
[4]
ABUL O, BONCHI F, NANNI M. Never walk alone: Uncertainty for anonymity in moving objects databases[C]Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on. Ieee, 2008: 376385.
[5]
GRUTESER M, GRUNWALD D. Anonymous usage of locationbased services through spatial and temporal cloaking[C]Proceedings of the 1st international conference on Mobile systems, applications and services. ACM, 2003: 3142.
[6]
LI N, LI T, VENKATASUBRAMANIAN S. tcloseness: Privacy beyond kanonymity and ldiversity[C]Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. IEEE, 2007: 106115.
[7]
DWORK C. Differential privacy[M]Encyclopedia of Cryptography and Security. US: Springer, 2011: 338340.
[8]
DWORK C. Differential privacy: A survey of results[M]Theory and Applications of Models of Computation. Berlin Heidelberg: Springer, 2008: 119.
[9]
DWORK C, LEI J. Differential privacy and robust statistics[C]Proceedings of the fortyfirst annual ACM symposium on Theory of computing. ACM, 2009: 371380.