Clarinox Technologies Pty Ltd., “Real Time Location Systems,” 2009. http://www.clarinox.com/docs/whitepapers/RealTime_main.pdf
 M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking,” Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, 5-8 May 2003, pp. 31-42. doi:10.1145/1066116.1189037
 C. Y. Chow, M. F. Mokbel and X. Liu, “A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous LocationBased Services,” Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, Arlington, 10-11 November 2006, pp. 171-178. doi:10.1145/183471.1183500
 B. Gedik and L. Liu, “Location Privacy in Mobile Systems a Personalized Anonymization Model,” Proceedings of the 25th International Conference on Distributed Computing System of the IEEE ICDCS, Columbus, 10 June 2005, pp. 620-629. doi:10.1109/ICDCS.2005.48
 M. F. Mokbel, C. Y. Chow and W. G. Aref, “The New Casper: Query Processing for Location Services without Compromising Privacy,” Proceedings of the VLDB 2006, Seoul, 12-15 September 2006, pp. 763-774.
 H. Kido, Y. Yanagisawa and T. Satoh, “An Anonymous Communication Technique Using Dummies for LocationBased Services,” Proceedings of the International Conference on Pervasive Services of the IEEE ICPS 05, Santorini, 11-14 July 2005, pp. 88-97. doi:10.1109/PERSER.2005.1506394
 T. You, W. Peng and W. Lee, “Protect Moving Trajectories with Dummies,” Proceedings of the International Conference on Mobile Data Management, Mannheim, 1 May 2007, pp. 278-282. doi:10.1109/MDM.2007.58
 G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi and K.-L. Tan, “Private Queries in Location-Based Services: Anonymizers Are Not Necessary,” Proceedings of the SIGMOD 08, Vancouver, 9-12 June 2008, pp. 121-132.
 C. Gentry and Z. Ramzan, “Single-Database Private InFormation Retrieval with Constant Communication Rate,” Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, Lisboa, 11-15 July 2005, pp. 803-815.
 D. Rebollo-Monedero and J. Forne, “Optimized Query Forgery for Private Information Retrieval,” IEEE Transactions on Information Theory, Vol. 56, No. 9, 2010, pp. 4631-4642. doi:10.1109/TIT.2010.2054471
 Y. Gahi , M. Guennoun and K. El-khatib, “A Secure Database System Using Homomorphic Encryption Schemes,” Proceedings of the 3rd International Conference on Advances in Databases, Knowledge, and Data Applications, St. Maarten, 23-28 January 2011, pp. 54-58.