[1. Gruteser, M., D. Grunwald. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. - In: Proc. of 1st International Conference on Mobile Systems, Applications and Services. ACM, 2003, pp. 31-42.10.1145/1066116.1189037]Search in Google Scholar
[2. Xiao-Feng, H. U. O. Z. M. A Survey of Trajectory Privacy-Preserving Techniques. - Chinese Journal of Computers, Vol. 10, 2011.]Search in Google Scholar
[3. Huo, Z., X. Meng, H. Hu, et al. You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection. - In: Proc. of Database Systems for Advanced Applications.Springer Berlin Heidelberg, 2012, pp. 351-366.]Search in Google Scholar
[4. You, T. H., W. C. Peng, W. C. Lee. Protecting Moving Trajectories with Dummies. - In: Proc. of Mobile Data Management, 2007 International Conference on. IEEE, 2007, pp. 278-282.10.1109/MDM.2007.58]Search in Google Scholar
[5. Terrovitis, M., N. Mamoulis. Privacy Preservation in the Publication of Trajectories. - In: Proc. of Mobile Data Management. (MDM’08) 9th International Conference on IEEE, 2008, pp. 65-72.10.1109/MDM.2008.29]Search in Google Scholar
[6. Abul, O., F. Bonchi, M. Nanni. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. - In: Proc. of Data Engineering (ICDE’2008) IEEE 24th International Conference on IEEE, 2008, pp. 376-385.]Search in Google Scholar
[7. Nergiz, M. E., M. Atzori, Y. Saygin. Towards Trajectory Anonymization: A Generalization-Based Approach. - In: Proc. of SIGSPATIAL ACM GIS’2008 International Workshop on Security and Privacy in GIS and LBS. ACM, 2008, pp. 52-61.]Search in Google Scholar
[8. Yarovoy, R., F. Bonchi, L. V. S. Lakshmanan et al. Anonymizing Moving Objects: How to Hide a MOB in a Crowd? - In: Proc. of 12th International Conference on Extending Database Technology: Advances in Database Technology. ACM, 2009, pp. 72-83.]Search in Google Scholar
[9. Sadilek, A., H. Kautz, J. P. Bigham. Finding Your Friends and Following Them to Where You Are. - In: Proc. of 5th ACM International Conference on Web Search and Data Mining. ACM, 2012, pp. 723-732.10.1145/2124295.2124380]Search in Google Scholar
[10. Freni, D., C. Ruiz Vicente, S. Mascetti et al. Preserving Location and Absence Privacy in Geo-Social Networks. - In: Proc. of 19th ACM International Conference on Information and Knowledge Management, ACM, 2010, pp. 309-318.10.1145/1871437.1871480]Search in Google Scholar
[11. Mascetti, S., D. Freni, C. Bettini et al. Privacy in Geo-Social Networks: Proximity Notification with Untrusted Service Providers and Curious Buddies. - The VLDB Journal - The International Journal on Very Large Data Bases, Vol. 20, 2011, No 4, pp. 541-566.10.1007/s00778-010-0213-7]Search in Google Scholar
[12. Mascetti, S., C. Bettini, D. Freni et al. Privacy-Aware Proximity Based Services. - In: Proc. of Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09.Tenth International Conference on IEEE, 2009, pp. 31-40.]Search in Google Scholar
[13. Huo, Z, X. F. Meng, Y. Huang. PrivateCheckIn: Trajectory Privacy-Preserving for Check-in Services in MSNS. - Jisuanji Xuebao, Chinese Journal of Computers, Vol. 36, 2013, No 4, pp. 716-726.10.3724/SP.J.1016.2013.00716]Search in Google Scholar
[14. Cho, E, S. A. Myers, J. Leskovec. Friendship and Mobility: User Movement in Location- Based Social Networks. - In: Proc. of 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2011, pp. 1082-1090.]Search in Google Scholar