A. Kofod-petersen and J. Cassens, Proxies for Privacy in Ambient Systems, pp.62-74, 2012.

Z. Brakerski and G. N. Rothblum, Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding, IACR Cryptology ePrint Archive, 2013.

J. Camenish and A. Lysyanskaya, A Signature Scheme with Efficient Protocols, pp.268-289, 2003.
DOI : 10.1007/3-540-36413-7_20

M. L. Damiani, Privacy Enhancing Techniques for the Protection of Mobility Patterns in LBS:Research Issues and Trends, 2013.

M. Damiani, E. Bertino, and C. Silvestri, PROBE: an Obfuscation System for the Protection of Sensitive Location Information in LBS, 2008.

G. Ghinita, Understanding the privacy-efficiency trade-off in location based queries, Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL '08, pp.1-5, 2008.
DOI : 10.1145/1503402.1503404

S. Garg, C. Gentry, and S. Halevi, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, EUROCRYPT 2013, pp.1-17, 2013.

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, Private queries in location based services, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, pp.121-132, 2008.
DOI : 10.1145/1376616.1376631

P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, Preserving Location-based Identity Inference in Anonymous Spatial Queries, IEEE TKDE, vol.19, issue.12, pp.1719-1733, 2007.

M. F. Mokbel, C. Y. Chow, and W. G. Aref, The New Casper: Query Processing for Location Services without Compromising Privacy, Proceedings of VLDB, pp.763-774, 2006.

M. Dahl, S. Delaune, and G. Steel, Formal Analysis of Privacy for Anonymous Location Based Services, Proceedings of the Workshop on Theory of Security and Applications (TOSCA'11), pp.98-112, 2012.
DOI : 10.1007/978-3-642-27375-9_6

M. L. Yiu, C. Jensen, X. Huang, and H. Lu, SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services, 2008 IEEE 24th International Conference on Data Engineering, pp.366-375, 2008.
DOI : 10.1109/ICDE.2008.4497445