1 김용기, "공간 네트워크 데이터베이스에서 공간 제약을 고려한 경로 내 최근접 질의처리 알고리즘" 한국공간정보시스템학회 10 (10): 19-30, 2008
2 김용기, "공간 네트워크 데이터베이스에서 POI 기반 실체화 기법을 이용한 Closest Pairs 및 e-distance 조인 질의처리 알고리즘" 한국공간정보시스템학회 9 (9): 67-80, 2007
3 D. Sacharidis, "k-Anonymity in the Presence of ExternalDatabases" 22 (22): 392-403, 2010
4 Y. Yang, "Spatial Outsourcing for Location-based Services" 1082-1091, 2008
5 Wong, W. K, "Secure k-NN computation on encrypted databases" 139-152, 2009
6 National Institute of Standards and Technology, "Secure Hashing"
7 L. Qiu, "Protecting business intelligence and customer privacy while outsourcing data mining tasks" 1 : 99-120, 2008
8 A. Khoshgozaran, "Private Buddy Search: Enabling Private Spatial Queries in Social Networks" 04 : 166-173, 2009
9 T. Wang, "Privacy-Aware Mobile Services over Road Networks" 2 (2): 1042-1053, 2009
10 M. L. Yiu, "Outsourcing of Private Spatial Data for Search Services" 1140-1143, 2009
1 김용기, "공간 네트워크 데이터베이스에서 공간 제약을 고려한 경로 내 최근접 질의처리 알고리즘" 한국공간정보시스템학회 10 (10): 19-30, 2008
2 김용기, "공간 네트워크 데이터베이스에서 POI 기반 실체화 기법을 이용한 Closest Pairs 및 e-distance 조인 질의처리 알고리즘" 한국공간정보시스템학회 9 (9): 67-80, 2007
3 D. Sacharidis, "k-Anonymity in the Presence of ExternalDatabases" 22 (22): 392-403, 2010
4 Y. Yang, "Spatial Outsourcing for Location-based Services" 1082-1091, 2008
5 Wong, W. K, "Secure k-NN computation on encrypted databases" 139-152, 2009
6 National Institute of Standards and Technology, "Secure Hashing"
7 L. Qiu, "Protecting business intelligence and customer privacy while outsourcing data mining tasks" 1 : 99-120, 2008
8 A. Khoshgozaran, "Private Buddy Search: Enabling Private Spatial Queries in Social Networks" 04 : 166-173, 2009
9 T. Wang, "Privacy-Aware Mobile Services over Road Networks" 2 (2): 1042-1053, 2009
10 M. L. Yiu, "Outsourcing of Private Spatial Data for Search Services" 1140-1143, 2009
11 M. L. Yiu, "Outsourced Similarity Search on MetricData Assets" 24 (24): 338-352, 2012
12 R. Agrawal, "Order-Preserving Encryption forNumeric Data" 563-574, 2004
13 X. Jiang, "Multiple sensitive association protection in theoutsourced database" 2 : 123-137, 2010
14 P. Ciaccia, "M-tree: An Efficient Access Method for Similarity Search in Metric Spaces" 426-435, 1997
15 M. L. Yiu, "Enabling Search Services on Outsourced Private Spatial Data" 19 (19): 363-384, 2010
16 A. Khoshgozaran, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy" 239-257, 2007
17 T. Brinkhoff, "A Framework for Generating Network-Based Moving Objects" 6 (6): 153-180, 2002