參考文獻 |
[1] European Global Navigation Satellite Systems Agency, “Gnss market report,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://www.gsa.europa.eu/market/marketreport
[2] M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, ser. MobiSys’03. New York, NY, USA: Association for Computing Machinery, 2003. [Online]. Available: https://doi.org/10.1145/1066116.1189037
[3] A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46–55, 2003.
[4] C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, “An obfuscation-based
approach for protecting location privacy,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 13–27, 2011.
[5] A. Gutscher, “Coordinate transformation a solution for the privacy problem of location based services?” in Proceedings of the 20th International Conference on Parallel and Distributed Processing, ser. IPDPS'06. USA: IEEE Computer Society, 2006.
[6] H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based
services,” in ICPS ’05. Proceedings. International Conference on Pervasive Services, 2005., 2005.
[7] H. Lu, C. S. Jensen, and M. L. Yiu, “Pad: Privacy-area aware, dummy-based location privacy in mobile services,” in Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, ser. MobiDE '08. New York, NY, USA: Association for Computing Machinery, 2008. [Online]. Available: https://doi.org/10.1145/1626536.1626540
[8] B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, “Achieving k-anonymity in privacy-aware location-based services,” in IEEE INFOCOM 2014 IEEE Conference on Computer Communications, 2014.
[9] G. Sun, V. Chang, M. Ramachandran, Z. Sun, G. Li, H. Yu, and D. Liao, “Efficient location privacy algorithm for internet of things (iot) services and applications,” J. Netw. Comput. Appl., vol. 89, no. C, p. 3–13, Jul. 2017. [Online]. Available: https://doi.org/10.1016/j.jnca.2016.10.011
[10] B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, “Enhancing privacy through caching in location-based services,” in 2015 IEEE Conference on Computer Communications (INFOCOM), 2015.
[11] H. Li, H. Zhu, S. Du, X. Liang, and X. Shen, “Privacy leakage of location sharing in mobile social networks: Attacks and defense,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 646–660, 2018.
[12] K. Fawaz and K. G. Shin, “Location privacy protection for smartphone users,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '14. New York, NY, USA: Association for Computing Machinery, 2014. [Online]. Available: https://doi.org/10.1145/2660267.2660270
[13] Apple Inc., “Apple ios 14 preview,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://www.apple.com/ios/ios-14-preview/
[14] J. Reardon, Á. Feal, P. Wijesekera, A. E. B. On, N. VallinaRodriguez, and S. Egelman, “50 ways to leak your data: An exploration of apps’ circumvention of the android permissions system,” in 28th USENIX Security
Symposium (USENIX Security 19). Santa Clara, CA: USENIX Association, Aug. 2019. [Online]. Available: https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
[15] Common Vulnerabilities and Exposures, “Cve in android,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Android
[16] CVE Details, “Google’s android vulnerability statistics,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://www.cvedetails.com/product/19997/Google-Android.html?vendor_id=1224
[17] M. Hron, “The secret life of gps trackers (1/2),” 2019, [Online; accessed 27-July-2020]. [Online]. Available: https://decoded.avast.io/martinhron/the-secret-life-of-gps-trackers/
[18] Wikipedia contributors, “Latin square — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Latin_square&oldid=967783072
[19] S. Pinto and N. Santos, “Demystifying arm trustzone: A comprehensive survey,” ACM Comput. Surv., vol. 51, no. 6, Jan. 2019. [Online]. Available: https://doi.org/10.1145/3291047
[20] Wikipedia contributors, “Trusted execution environment — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Trusted_execution_environment&oldid=967289182
[21] S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia, “Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies,” The VLDB Journal, vol. 20, no. 4, p. 541–566, Aug. 2011. [Online]. Available: https://doi.org/10.1007/s00778-010-0213-7
[22] A. Beresford, A. Rice, N. Skehin, and R. Sohan, “Mockdroid: Trading privacy for application functionality on smartphones,” HotMobile 2011: The 12th Workshop on Mobile Computing Systems and Applications, 03 2011.
[23] V. T. Muralidharan, V. Namboodiri, and B. S. Rajan, “Wireless network-coded bidirectional relaying using latin squares for m-psk modulation,” IEEE Transactions on Information Theory, vol. 59, no. 10, pp. 6683–6711, 2013.
[24] R. Tso and Y. Miao, “A survey of secret sharing schemes based on latin squares,” 08 2018.
[25] M. Y. Hsiao, D. C. Bossen, and R. T. Chien, “Orthogonal latin square codes,” IBM Journal of Research and Development, vol. 14, no. 4, pp. 390–394, 1970.
[26] C. Colbourn, “The complexity of completing partial latin squares,” Discrete Applied Mathematics, vol. 8, no. 1, pp. 25–30, Apr. 1984.
[27] CVE Details, “Linux kernel vulnerability statistics,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33
[28] OMTP.org, “Omtp advanced trusted environment omtp tr1 v1.1,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: http://www.omtp.org/OMTP_Advanced_Trusted_Environment_OMTP_TR1_v1_1.pdf
[29] GlobalPlatform.org, 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://globalplatform.org/
[30] GlobalPlatform, “Tee system architecture v1.2,” 2018, [Online; accessed 27-July-2020]. [Online]. Available: https://globalplatform.org/specs-library/tee-system-architecture-v1-2/
[31] GlobalPlatform, “Tee client api specification v1.0,” 2010, [Online; accessed 27-July-2020]. [Online]. Available: https://globalplatform.org/specs-library/tee-client-api-specification/
[32] GlobalPlatform, “Tee internal core api specification v1.2.1,” 2019, [Online; accessed 27-July-2020]. [Online]. Available: https://globalplatform.org/specs-library/tee-internal-core-api-specification-v1-2/
[33] V. Costan and S. Devadas, “Intel sgx explained,” IACR Cryptol. ePrint Arch., vol. 2016, p. 86, 2016.
[34] David Kaplanm Jeremy Powell, and Tom Woller, “Amd memory encryption,” 2016, [Online; accessed 27-July-2020]. [Online]. Available: https://developer.amd.com/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf
[35] ARM Limited, “Arm trustzone technology,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://developer.arm.com/ip-products/security-ip/trustzone
[36] ARM Limited, “Building a secure system using trustzone technology,” 2009, [Online; accessed 27-July-2020]. [Online]. Available: https://static.docs.arm.com/genc009492/c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf
[37] ARM Limited, “Smc calling convention system software on arm platforms,” 2016, [Online; accessed 27-July-2020]. [Online]. Available: https://developer.arm.com/documentation/den0028/b/
[38] Wikipedia contributors, “List of countries and dependencies by area — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 18-August-2020]. [Online]. Available: https://en.wikipedia.org/w/index.php?title=List_of_countries_and_dependencies_by_area&oldid=971253659
[39] A. Howse, “Minimal critical sets for some small latin squares,” Australas. J Comb., vol. 17, pp. 275–288, 1998.
[40] J. Cooper, D. Donovan, and J. Seberry, “Latin squares and critical sets of minimal size,” The Australasian Journal of Combinatorics [electronic only], vol. 4, 01 1991.
[41] T. Hara, A. Suzuki, M. Iwata, Y. Arase, and X. Xie, “Dummy-based user location anonymization under real-world constraints,” IEEE Access, vol. 4, pp. 673–687, 2016.
[42] C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, and N. S. V. Rao, “Privacy vulnerability of published anonymous mobility traces,” IEEE/ACM Transactions on Networking, vol. 21, no. 3, pp. 720–733, 2013.
[43] X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, “A game-theoretic approach for achieving k-anonymity in location based services,” in 2013 Proceedings IEEE INFOCOM, 2013.
[44] ARM-software, “arm-trusted-firmware,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://github.com/ARMsoftware/arm-trusted-firmware
[45] ublox, “Neo-6 u-blox 6 gps modules data sheet,” 2011, [Online; accessed 27-July-2020]. [Online]. Available: https://www.u-blox.com/sites/default/files/products/documents/NEO-6_DataSheet_(GPS.G6-HW-09005).pdf
[46] Wikipedia contributors, “Nmea 0183 — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 18-August-2020]. [Online]. Available: https://en.wikipedia.org/w/index.php?title=NMEA_0183&oldid=963303783
[47] OPTEE, “Op-tee client api,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://github.com/OP-TEE/optee_client
[48] GPSD, “gpsd —a gps service daemon,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://gpsd.gitlab.io/gpsd/index.html
[49] Kosma Moczek, “minmea, a lightweight gps nmea 0183 parser library,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://github.com/kosma/minmea
[50] Linux Programmer’s Manual, “termios(3) —linux manual page,” 2020, [Online; accessed 27-July-2020]. [Online]. Available: https://man7.org/linux/man-pages/man3/termios.3.html
[51] Wikipedia contributors, “Galois/Counter Mode — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 15-August-2020]. [Online]. Available: https://en.wikipedia.org/wiki/Galois/Counter_Mode
[52] ARM Developer, “Neon,” [Online; accessed 15-August-2020]. [Online]. Available: https://developer.arm.com/architectures/instruction-sets/simd-isas/neon
[53] Wikipedia contributors, “Simd — Wikipedia, the free encyclopedia,” 2020, [Online; accessed 18-August-2020]. [Online]. Available: https://en.wikipedia.org/w/index.php?title=SIMD&oldid=972038390 |