1. Encryption algorithm using polyline simplification for GIS vector map;Bang N.;Journal of Korea Multimedia Society,2016
2. Beckmann, N., et al., 1990. The R*-tree: an efficient and robust access method for points and rectangles. In: Proceedings of the 1990 ACM SIGMOD international conference on Management of data. Presented at the SIGMOD 90: SIGMOD’90, Atlantic, NJ, USA. ACM, 322–331.
3. Bertino, E., Damiani, M.L., and Momini, D., 2004. An access control system for a Web map management service. In: Presented at the 14th international workshop research issues on data engineering: web services for e-commerce and e-government applications, 2004. Proceedings, 33–39.
4. Bloom, C., et al., 2017. Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. In: Presented at the thirteenth symposium on usable privacy and security (SOUPS 2017), 357–375.
5. The control of chaos: theory and applications;Boccaletti S.;Physics Reports,2000