1 |
A. Khoshgozaran, H. Shirani-Mehr and C. Shahabi, "Blind evaluation of location based queries using space transformation to preserve location privacy," Geoinformatica, vol. 17, no.4, pp.599-634, Jan. 2013.
DOI
|
2 |
N. Shen, C. F. Jia and S. Liang, "Approach of location privacy protection based on order preserving encryption of the grid," Journal of Communications, vol. 38, no.7, pp. 78-88, Jul. 2017. Articl(CrossRefLink)
|
3 |
D, Belazzougui, P, Boldi, R, Pagh, "Monotone minimal perfect hashing: searching a sorted table with o(1) accesses," in Proc. of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 785-794, 2009.
|
4 |
R. Agrawal, J. Kiernan and R. Srikant, "Order-preserving encryption for numeric data," in Proc. of 2004 ACM SIGMOD international conference on Management of data, pp. 563-574, 2004.
|
5 |
A. Boldyreva, N. Chenette and Y. Lee, "Order-Preserving Symmetric Encryption," in Proc. of Advances in Cryptology-EUROCRYPT 2009, vol.5479, no.1, pp. 224-241, Otc. 2009.
|
6 |
M. Bader, Space-filling Curves, NewYork, USA: Springer, 2012
|
7 |
D. Hilbert, "Uber die Stetige Abbildung einer Linie auf ein Flachenstuck," Mathematische Annalen, vol.38, no.1, pp.459-460, Sep. 1891.
DOI
|
8 |
H.V. Jagadish, "Linear clustering of objects with multiple attributes," in Proc. of 1990 ACM SIGMOD International Conference on Management of Data, Atlantic City, NJ, USA, pp. 332-342, 1990.
|
9 |
J.A. Orenstein, "Spatial query processing in an object-oriented database system," ACM SIGMOD Record, vol.15, no.2, pp.326-336, Jun. 1986.
DOI
|
10 |
Cyberspace administration of china, "To protect data security, the network security review method is coming," China Youth Jan. 05, 2022. Network [Online]. Available: https://feeds-drcn.cloud.huawei.com.cn/landingpage/latest?docid=10510674803129c3862f3f4219d9efbbc44ee86&to_app=hwbrowser&dy_scenario=sticky&tn=cc9e75d798880aacd17f00fe36ccb7ac3369f16421ad696952a51b55a9bcb3f5share_to=link&channel=HW_TRENDING&ctype=news&appid=hwbrowser&cpid=666&r=CN
|
11 |
A. Boldyreva, N. Chenette, and A. O'Neill, "Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions," in Proc. of the 31st Annual Cryptology Conference, pp. 578-595, 2011.
|
12 |
A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in Proc. of Advances in Spatial and Temporal Databases, SSTD 2007, vol.4605, no.1, pp.239-257, Jul. 2007.
|
13 |
F. Tian, X. L. Gui and X. J. Zhang, "Privacy-preserving approach for outsourced spatial data based on POI distribution," Journal of Computer, vol. 37, no.1, pp. 123-138, Jan. 2014.
|
14 |
C. Faloutsos and S. Roseman, "Fractals for secondary key retrieval," in Proc. of the 8th Symposium on Principles of Database Systems, 247-252, 1989.
|
15 |
C. L. Zhou, Y. H. Chen and H. Tian, "Location privacy and query privacy preserving method for K-nearest neighbor query in road networks," Journal of Software, vol. 31, no.2, pp. 471-492, Feb. 2020.
|
16 |
D. P. Hu, Decimal block encryption based on negative hypergeometric distribution, Beijing, China: Tsinghua University Press, 2018
|