{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:53:05Z","timestamp":1773179585493,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540687900","type":"print"},{"value":"9783540687931","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_23","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"393-412","source":"Crossref","is-referenced-by-count":201,"title":["Preserving User Location Privacy in Mobile Data Management Infrastructures"],"prefix":"10.1007","author":[{"given":"Reynold","family":"Cheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sunil","family":"Prabhakar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"7","key":"23_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSPEC.2003.1209608","volume":"40","author":"J. Warrior","year":"2003","unstructured":"Warrior, J., McHenry, E., McGee, K.: They know where you are. IEEE Spectrum\u00a040(7), 20\u201325 (2003)","journal-title":"IEEE Spectrum"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. 1st Intl. Conf. on Mobile Systems, Applications, and Services (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Varshney, U.: Location management for mobile commerce applications in wireless internet environment. ACM Transactions on Internet Technology\u00a03(3) (2003)","DOI":"10.1145\/857166.857169"},{"issue":"1","key":"23_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/501158.501164","volume-title":"Proceedings of the 3rd ACM conference on Electronic Commerce","author":"E. Snekkenes","year":"2001","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, pp. 48\u201357. ACM Press, New York (2001)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Hengartner, U., Steenkiste, P.: Protecting Access to People Location Information. In: Proc. 1st Intl. Conf. on Security in Pervasive Computing (2003)","DOI":"10.1007\/978-3-540-39881-3_6"},{"key":"23_CR7","unstructured":"Hengartner, U., Steenkiste, P.: Access control to information in pervasive computing environments. In: Proc. 9th USENIX Workshop on HotOS (2003)"},{"key":"23_CR8","unstructured":"Cheng, R., Prabhakar, S.: Using uncertainty to provide privacy-preserving and high-quality location-based services. In: Workshop on Location Systems Privacy and Control, MobileHCI 2004 (2004)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Atallah, M., Frikken, K.: Privacy-preserving location-dependent query processing. In: Proc. ACS\/IEEE Intl. Conf. on Pervasive Services (ICPS) (2004)","DOI":"10.1109\/PERSER.2004.24"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Mokbel, M., Xiong, X., Aref, W.: SINA: Scalable incremental processing of continuous queries in spatio-temporal databases. In: Proc. ACM SIGMOD (2004)","DOI":"10.1145\/1007568.1007638"},{"key":"23_CR11","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, unobservability, psuedonymity, and identity management - a proposal for terminology (2004)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Intl. Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5) (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proc. ACM SIGMOD Intl. Conf. (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ooi, B., Yang, Y., Deng, R.: Privacy and ownership preserving of outsourced medical data. In: Proc. IEEE ICDE (2005)","DOI":"10.1109\/ICDE.2005.111"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security and Privacy\u00a02(2) (2004)","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"23_CR16","unstructured":"Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS (2005)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Cheng, R., Kalashnikov, D., Prabhakar, S.: Evaluating probabilistic queries over imprecise data. In: Proc. ACM SIGMOD (2003)","DOI":"10.1145\/872757.872823"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, Springer, Heidelberg (2003)"},{"key":"23_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04245-8","volume-title":"Computational Geometry \u2013 Algorithms and Applications","author":"M. Berg","year":"2000","unstructured":"Berg, M., Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry \u2013 Algorithms and Applications, 2nd edn. Springer, Heidelberg (2000)","edition":"2"},{"key":"23_CR20","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Querying private data in moving-object environments. Technical Report CERIAS TR #2005-45, Purdue U (2005)"},{"key":"23_CR21","unstructured":"Kaufman, J., Myllymaki, J., Jackson, J.: IBM City Simulator Spatial Data Generator 2.0 (2001)"},{"key":"23_CR22","volume-title":"Wireless Communications and Networks","author":"W. Stallings","year":"2005","unstructured":"Stallings, W.: Wireless Communications and Networks. Prentice-Hall, Englewood Cliffs (2005)"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Wong, V., Leung, V.: Location management for next-generation personal communications network. IEEE Network (2000)","DOI":"10.1109\/65.871336"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:00:32Z","timestamp":1605643232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11957454_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}