{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:04:28Z","timestamp":1725501868994},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387308586"},{"type":"electronic","value":"9780387359731"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-35973-1_1020","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T18:20:31Z","timestamp":1199816431000},"page":"903-906","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preservation of GPS Traces"],"prefix":"10.1007","author":[{"given":"Marco","family":"Gruteser","sequence":"first","affiliation":[]},{"given":"Baik","family":"Hoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1020_CR1","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/342009.335438","volume-title":"Proc. of the ACM SIGMOD Conference on Management of Data, May 2000","author":"R. Agrawal","year":"2000","unstructured":"Agrawal,\u00a0R.,\nSrikant,\u00a0R.: Privacy-preserving data mining. In: Proc. of the ACM SIGMOD\nConference on Management of Data, May 2000, pp. 439\u2013450. ACM Press,\nDallas, Texas (2000)"},{"key":"1020_CR2","first-page":"127","volume-title":"IEEE Workshop on Pervasive Computing and Communication Security (PerSec)","author":"A. Beresford","year":"2004","unstructured":"Beresford,\u00a0A.,\nStajano,\u00a0F.: Mix zones: User privacy in location-aware services. In: IEEE\nWorkshop on Pervasive Computing and Communication Security (PerSec),\npp. 127\u2013131. IEEE Computer Society, Washington, DC, USA\n(2004)"},{"key":"1020_CR3","first-page":"650","volume-title":"Proceedings of the 7th International IEEE Conference on Intelligent Transportation Systems, Vienna, Austria, September 2005","author":"A.J. Blumberg","year":"2005","unstructured":"Blumberg,\u00a0A.J.,\nKeeler,\u00a0L., Shelat,\u00a0A.: Automated traffic enforcement which respects\ndriver privacy. In: Proceedings of the 7th International IEEE Conference on\nIntelligent Transportation Systems, Vienna, Austria, September 2005,\npp. 650\u2013655. IEEE Computer Society, Washington, DC, USA\n(2005)"},{"issue":"5","key":"1020_CR4","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"L. Brandeis","year":"1890","unstructured":"Brandeis,\u00a0L.,\nWarren,\u00a0S.: The right to privacy. Harvard Law Rev. 4(5), 193\u2013220 (1890)","journal-title":"Harvard Law Rev."},{"issue":"10","key":"1020_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum,\u00a0D.:\nSecurity without identification: Transaction systems to make big brother\nobsolete. Commun. ACM 28(10), 1030\u20131044\n(1985)","journal-title":"Commun. ACM"},{"key":"1020_CR6","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1089761.1089775","volume-title":"Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, Montreal, Quebec, Canada, 2005","author":"J.Y. Choi","year":"2005","unstructured":"Choi,\u00a0J.Y.,\nJakobsson,\u00a0M., Wetzel,\u00a0S.: Balancing auditability and privacy in\nvehicular networks. In: Q2SWinet '05: Proceedings of the 1st ACM international\nworkshop on Quality of service & security in wireless and mobile networks,\nMontreal, Quebec, Canada, 2005, pp. 79\u201387. ACM Press, New York, NY, USA\n(2005)"},{"issue":"5","key":"1020_CR7","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1109\/TKDE.2005.80","volume":"17","author":"A. Civilis","year":"2005","unstructured":"Civilis,\u00a0A.,\nPakalnis,\u00a0S.: Techniques for efficient road-network-based tracking of\nmoving objects. IEEE Trans. Knowl. Data Eng. 17(5), 698\u2013712 (2005) Senior Member-Christian\nS. Jensen","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1020_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"Proceedings of the First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA","author":"M. Gruteser","year":"2003","unstructured":"Gruteser,\u00a0M.,\nGrunwald,\u00a0D.: Anonymous usage of location-based services through spatial\nand temporal cloaking. In: Proceedings of the First International Conference\non Mobile Systems, Applications, and Services, San Francisco, CA,\npp. 31\u201342. ACM Press, New York, NY, USA\n(2003)"},{"key":"1020_CR9","first-page":"194","volume-title":"Proceedings of IEEE\/Create-Net SecureComm 2005, Athens, Greece, September 2005","author":"B. Hoh","year":"2005","unstructured":"Hoh,\u00a0B.,\nGruteser,\u00a0M.: Protecting location privacy through path confusion. In:\nProceedings of IEEE\/Create-Net SecureComm 2005, Athens, Greece, September\n2005, pp. 194\u2013205. IEEE Computer Society, Washington, DC, USA\n(2005)"},{"key":"1020_CR10","first-page":"1","volume-title":"Proceedings (Poster Session) of IEEE\/Create-Net SecureComm 2006, Baltimore, Maryland August 2006","author":"B. Hoh","year":"2006","unstructured":"Hoh,\u00a0B.,\nGruteser,\u00a0M., Xiong,\u00a0H., Alrabady,\u00a0A.: Enhancing privacy\npreservation of anonymous location sampling techniques in traffic monitoring\nsystems. In: Proceedings (Poster Session) of IEEE\/Create-Net SecureComm 2006,\nBaltimore, Maryland August 2006, pp. 1\u20133. IEEE Computer Society,\nWashington, DC, USA (2006)"},{"issue":"4","key":"1020_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MPRV.2006.69","volume":"5","author":"B. Hoh","year":"2006","unstructured":"Hoh,\u00a0B.,\nGruteser,\u00a0M., Xiong,\u00a0H., Alrabady,\u00a0A.: Enhancing security and\nprivacy in traffic-monitoring systems. IEEE Pervasive Comput. 5(4), 38\u201346 (2006)","journal-title":"IEEE Pervasive Comput."},{"key":"1020_CR12","volume-title":"CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA","author":"B. Hoh","year":"2007","unstructured":"Hoh, B.,\nGruteser, M., Xiong, H., Alrabady, A.: Preserving Privacy in GPS Traces via\nUncertainty-Aware Path Cloaking. In: CCS '07: Proceedings of the 14th ACM\nconference on Computer and communications security, Alexandria, Virginia,\nUSA. ACM Press, New York, NY, USA (2007, in\npress)"},{"key":"1020_CR13","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TAC.1979.1102177","volume":"24","author":"D.B. Reid","year":"1979","unstructured":"Reid,\u00a0D.:\nAn algorithm for tracking multiple targets. IEEE Trans. Autom. Control\n24(6), 843\u2013854\n(1979)","journal-title":"IEEE Trans. Automat. Control"},{"key":"1020_CR14","volume-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (Technical Report SRI-CSL-98-04)","author":"P. Samarati","year":"1998","unstructured":"Samarati,\u00a0P.,\nSweeney,\u00a0L.: Protecting privacy when disclosing information: k-anonymity\nand its enforcement through generalization and suppression (Technical Report\nSRI-CSL-98-04). Computer Science Laboratory, SRI International\n(1998)"},{"key":"1020_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1179601.1179605","volume-title":"WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society, Alexandria, Virginia, USA","author":"M. Li","year":"2006","unstructured":"Li,\u00a0M.,\nSampigethaya,\u00a0K., Huang,\u00a0L., Poovendran,\u00a0R.: Swing & swap:\nuser-centric approaches towards maximizing location privacy. In: WPES '06:\nProceedings of the 5th ACM workshop on Privacy in electronic society,\nAlexandria, Virginia, USA, pp. 19\u201328. ACM Press, New York, NY, USA\n\t    (2006). doi: \n                  10.1145\/1179601.1179605"}],"container-title":["Encyclopedia of GIS"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35973-1_1020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T11:06:02Z","timestamp":1557659162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35973-1_1020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9780387308586","9780387359731"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35973-1_1020","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}