M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003.
DOI : 10.1145/1066116.1189037

B. Gedik and L. Liu, Location Privacy in Mobile Systems: A Personalized Anonymization Model, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pp.620-629, 2005.
DOI : 10.1109/ICDCS.2005.48

C. Y. Chow and M. , Trajectory privacy in location-based services and data publication, ACM SIGKDD Explorations Newsletter, vol.13, issue.1, pp.19-29, 2011.
DOI : 10.1145/2031331.2031335

B. Bamba, L. Liu, and P. Pesti, Supporting anony mous location queries in mobile environments with privacygrid, Proceedings of the 17th international conference on World Wide Web, pp.237-246, 2008.

J. Xu, M. Xu, and X. Lin, Location privacy protection through anonymous cells in road network, Journal of Zhejiang University (Engineering Science), issue.3, p.6, 2011.

H. Kido, Y. Yanagisawa, and T. Satoh, An anonymous communication technique using dummies for location-based services, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005., pp.88-97, 2005.
DOI : 10.1109/PERSER.2005.1506394

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.2045

H. Lu, C. S. Jensen, M. L. Yiu, and . Pad, Privacy -area aware, dummy-based location privacy in mobile services, Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and M obile Access, pp.16-23, 2008.

J. I. Hong and J. A. Landay, An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004.
DOI : 10.1145/990064.990087

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.3857

M. L. Yiu, C. S. Jensen, and X. Huang, SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services, 2008 IEEE 24th International Conference on Data Engineering, pp.366-375, 2008.
DOI : 10.1109/ICDE.2008.4497445

S. Pellegrini, A. Ess, and K. Schindler, You'll never walk alone: Modeling social behavior for multi-target tracking, 2009 IEEE 12th International Conference on Computer Vision, pp.261-268, 2009.
DOI : 10.1109/ICCV.2009.5459260

URL : https://lirias.kuleuven.be/bitstream/123456789/266030/1/3051.pdf

Z. Huo, X. Eng, and H. Hu, You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection, Database Systems for Advanced Applications, pp.351-366
DOI : 10.1007/978-3-642-29038-1_26

C. Y. Chow, M. F. Liu, and X. , A peer-to-peer spatial cloaking algorithm for anonymous location-based service, Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems , GIS '06, pp.171-178, 2006.
DOI : 10.1145/1183471.1183500

C. Y. Chow, M. F. Liu, and X. , Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments, GeoInformatica, vol.13, issue.2, pp.351-380, 2011.
DOI : 10.1007/s10707-009-0099-y

Y. Huang, Z. Huo, M. , and X. F. Coprivacy, A collaborative location privacy -preserving method without cloaking region, Chinese Journal of Computers), issue.10, pp.34-1976, 2011.

Z. Gong, G. Z. Sun, and X. Xie, Protecting Privacy in Location-Based Services Using K-Anonymity without Cloaked Region, 2010 Eleventh International Conference on Mobile Data Management, pp.366-371, 2010.
DOI : 10.1109/MDM.2010.33

M. Xue, P. Kalnis, and H. Pung, Location Diversity: Enhanced Privacy Protection in Location Based Services, Context Awareness, pp.70-87, 2009.
DOI : 10.1007/978-3-642-01721-6_5

J. Xue, X. Y. Liu, and X. C. Yang, A Location Privacy Preserving Approach on Road Network, Chinese Journal of Computers, vol.34, issue.5, pp.34-865, 2011.
DOI : 10.3724/SP.J.1016.2011.00865

F. Liu, K. A. Hua, and Y. Cai, Query l-diversity in Location-Based Services, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp.436-442, 2009.
DOI : 10.1109/MDM.2009.72