Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network
 Wei W, Xu F, Li Q. Mobishare: Flexible privacy-preserving location sharing in mobile online social networks (C)//INFOCOM, 2012 Proceedings IEEE. IEEE, 2012: 2616-2620.
 Liu Z, Luo D, Li J, et al. N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks (J). International Journal of Computer Mathematics, 2016, 93(2): 384-400.
 Liu Z, Li J, Chen X, et al. New privacy-preserving location sharing system for mobile online social networks (C)//P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on. IEEE, 2013: 214-218.
 Li J, Li J, Chen X, et al. MobiShare+: Security improved system for location sharing in mobile online social networks (J). Journal of Internet Services and Information Security, 2014, 4(1): 25-36.
 Shen N, Yang J, Yuan K, et al. An efficient and privacy-preserving location sharing mechanism (J). Computer Standards & Interfaces, 2016, 44: 102-109.
 Pontikakos C, Glezakos T, Tsiligiridis T. Location-based services: architecture overview (C)//Proceedings of the International Congress on Information Technology in Agriculture, Food and Environment (ITAFE’05). 2005.
 Chow C Y, Mokbel M F. Privacy in location-based services: a system architecture perspective (J). Sigspatial Special, 2009, 1(2): 23-27.
 Jensen C S, Lu H, Yiu M L. Location privacy techniques in client-server architectures (M)//Privacy in location-based applications. Springer Berlin Heidelberg, 2009: 31-58.
 Qian Z, Chen C, You I, et al. ACSP: A novel security protocol against counting attack for UHF RFID systems (J). Computers & Mathematics with Applications, 2012, 63(2): 492-500.
 Ju X, Shin K G. Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps (J). Journal of Information Privacy and Security, 2015, 11(2): 62-79.
 Rao U P, Girme H. A novel framework for privacy preserving in location based services (C)//2015 Fifth International Conference on Advanced Computing & Communication Technologies. IEEE, 2015: 272-277.
 Sweeney L. k-anonymity: A model for protecting privacy (J). International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05): 557-570.
 Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking (C)//Proceedings of the 1st international conference on Mobile systems, applications and services. ACM, 2003: 31-42.
 Meyerowitz J, Roy Choudhury R. Hiding stars with fireworks: location privacy through camouflage (C)//Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, 2009: 345-356.
 Beresford A R, Stajano F. Location privacy in pervasive computing (J). IEEE Pervasive computing, 2003, 2(1): 46-55.
 Beresford A R, Stajano F. Mix Zones: User Privacy in Location-aware Services (C)//PerCom Workshops. 2004: 127-131.
 Ouyang Y, Le Z, Xu Y, et al. Providing Anonymity in Wireless Sensor Networks (C)//ICPS. 2007: 145-148.
 Rahman M, Mambo M, Inomata A, et al. An anonymous on-demand position-based routing in mobile ad hoc networks (C)//International Symposium on Applications and the Internet (SAINT'06). IEEE, 2006: 7 pp.-306.
 Chen Z, Hu X, Ju X, et al. LISA: Location information scrambler for privacy protection on smartphones (C)//Communications and Network Security (CNS), 2013 IEEE Conference on. IEEE, 2013: 296-304.
 Chen Z. Energy-efficient information collection and dissemination in wireless sensor networks (D). The University of Michigan, 2009.
 J. Li and K. Kim, Hidden attribute based signature without revocation, Inform. Sci. 180 (2010), pp. 1681–1689.
 J. Li and Y. Wang, Universal designated verifier ring signature (proof) without random oracles. Emerging Directions in Embedded and Ubiquitous Computing, Springer Berlin Heidelberg, 2006: 332–341.
 Rass S, Wigoutschnigg R, Schartner P. Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender-and Receiver-Anonymity (J). JoWUA, 2011, 2(4): 27-41.
 Xiao Y, Xiong L. Protecting locations with differential privacy under temporal correlations (C)//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015: 1298-1309.
 Li J, Kim K, Zhang F, et al. Aggregate proxy signature and verifiably encrypted proxy signature (C)//International Conference on Provable Security. Springer Berlin Heidelberg, 2007: 208-217.
 Li J, Zhang F, Wang Y. A new hierarchical ID-based cryptosystem and CCA-secure PKE (C) //International Conference on Embedded and Ubiquitous Computing. Springer Berlin Heidelberg, 2006: 362-371.
 Rahman F, Hoque M E, Kawsar F A, et al. Preserve your privacy with pco: A privacy sensitive architecture for context obfuscation for pervasive e-community based applications (C) //Social Computing (SocialCom), 2010 IEEE Second International Conference on. IEEE, 2010: 41-48.
 Cox L P, Dalton A, Marupadi V. Smokescreen: flexible privacy controls for presence-sharing (C) //Proceedings of the 5th international conference on Mobile systems, applications and services. ACM, 2007: 233-245.
 Li J, Yan H, Liu Z, et al. Location-Sharing Systems with Enhanced Privacy in Mobile Online Social Networks (J).
 Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks (C)//2008 IEEE 24th International Conference on Data Engineering. IEEE, 2008: 506-515.
 Narayanan A, Shmatikov V. De-anonymizing social networks (C)//2009 30th IEEE symposium on security and privacy. IEEE, 2009: 173-187.
 Wang G, Liu Q, Li F, et al. Outsourcing privacy-preserving social networks to a cloud (C)//INFOCOM, 2013 Proceedings IEEE. IEEE, 2013: 2886-2894.