共 23 条
- [1] MAYER J, MUTCHLER P, MITCHELL J C., Evaluating the Privacy Properties of Telephone Metadata, Proceedings of the National Academy of Sciences, 113, 20, pp. 5536-5541, (2016)
- [2] DE MONTJOYE Y A., Computational Privacy: Towards Privacy-Conscientious Uses of Metadata, (2015)
- [3] JIANG L, LI T, LI X, Et al., Anonymous Communication via Anonymous Identity-Based Encryption and its Application in IoT[J], Wireless Communications and Mobile Computing, 2018, pp. 1-8, (2018)
- [4] CHAUM D, DAS D, JAVANI F, Et al., cMx: Mxing with Mnimal Real-Time Asymmetric Cryptographic Operations [C], International Conference on Applied Cryptography and Network Security, pp. 557-578, (2017)
- [5] XU Hua, TIAN Youliang, Protection of Privacy of the Weighted Social Network under Differential Privacy, Journal of Xidian University, 49, 1, pp. 17-25, (2022)
- [6] JAYARAMAN I, STANISLAUS PANNEERSELVAM A., A Novel Privacy Preserving Digital Forensic Readiness Provable Data Possession Technique for Health Care Data in Cloud, Journal of Ambient Intelligence and Humanized Computing, 12, 5, pp. 4911-4924, (2021)
- [7] SILVA P, CASALEIRO R, SIMOES P, Et al., Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform, SN Computer Science, 1, 4, pp. 1-10, (2020)
- [8] WANG X, XU Z, CAI Z, Et al., Novel Temporal Perturbation-Based Privacy-Preserving Mechanism for Smart Meters, Mobile Networks and Applications, 25, 4, pp. 1548-1562, (2020)
- [9] ZUO Kaizhong, LIU Rui, ZHAO Jun, Et al., Method for the Protection of Spatiotemporal Correlation Location Privacy with Semantic Information, Journal of Xidian University, 49, 1, pp. 67-77, (2022)
- [10] LI F, LIU Z, WANG Y, Et al., Aitac: An Identity-Based Traceable Anonymous Communication Model [J], Journal of Ambient Intelligence and Humanized Computing, 13, pp. 1353-1362, (2022)