{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:48:48Z","timestamp":1769024928655,"version":"3.49.0"},"publisher-location":"New York, NY","reference-count":66,"publisher":"Springer New York","isbn-type":[{"value":"9781461416289","type":"print"},{"value":"9781461416296","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4614-1629-6_4","type":"book-chapter","created":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T17:49:31Z","timestamp":1317404971000},"page":"109-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Privacy of Spatial Trajectories"],"prefix":"10.1007","author":[{"given":"Chi-Yin","family":"Chow","sequence":"first","affiliation":[]},{"given":"Mohemad F.","family":"Mokbel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,26]]},"reference":[{"key":"4_CR1_4","volume-title":"Never walk alone: Uncertainty for anonymity in moving objects databases","author":"O Abul","year":"2008","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Never walk alone: Uncertainty for anonymity in moving objects databases. In: Proceedings of the IEEE International Conference on Data Engineering (2008)"},{"key":"4_CR2_4","volume-title":"Supporting anonymous location queries in mobile environments with PrivacyGrid","author":"B Bamba","year":"2008","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with PrivacyGrid. In: Proceedings of the International Conference on World Wide Web (2008)"},{"key":"4_CR3_4","volume-title":"Efficient evaluation of k-range nearest neighbor queries in road networks","author":"J Bao","year":"2010","unstructured":"Bao, J., Chow, C.Y., Mokbel, M.F., Ku, W.S.: Efficient evaluation of k-range nearest neighbor queries in road networks. In: Proceedings of the International Conference on Mobile Data Management (2010)"},{"issue":"1","key":"4_CR4_4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"4_CR5_4","volume-title":"Preserving user location privacy in mobile data management infrastructures","author":"R Cheng","year":"2006","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Proceedings of International Privacy Enhancing Technologies Symposium (2006)"},{"key":"4_CR6_4","volume-title":"Towards location-based social networking services","author":"CY Chow","year":"2010","unstructured":"Chow, C.Y., Bao, J., Mokbel, M.F.: Towards location-based social networking services. In: Proceedings of the ACM SIGSPATIAL International Workshop on Location Based Social Networks (2010)"},{"issue":"1","key":"4_CR7_4","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TMC.2010.145","volume":"10","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Transactions on Mobile Computing 10(1), 94\u2013107 (2011)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"4_CR8_4","volume-title":"Enabling private continuous queries for revealed user locations","author":"CY Chow","year":"2007","unstructured":"Chow, C.Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Proceedings of the International Symposium on Spatial and Temporal Databases (2007)"},{"issue":"4","key":"4_CR9_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"C.Y. Chow","year":"2009","unstructured":"Chow, C.Y., Mokbel, M.F., Aref,W.G.: Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems 34(4), 24:1\u201324:48 (2009)","journal-title":"ACM Transactions on Database Systems"},{"issue":"3","key":"4_CR10_4","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10707-010-0117-0","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F., Bao, J., Liu, X.: Query-aware location anonymization in road networks. GeoInformatica 15(3), 571\u2013607 (2011)","journal-title":"GeoInformatica"},{"key":"4_CR11_4","volume-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based services","author":"CY Chow","year":"2006","unstructured":"Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: Proceedings of the ACM Symposium on Advances in Geographic Information Systems (2006)"},{"issue":"2","key":"4_CR12_4","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351\u2013380 (2011)","journal-title":"GeoInformatica"},{"key":"4_CR13_4","unstructured":"Dateline NBC: Tracing a stalker. http:\/\/www.msnbc.msn.com\/id\/19253352 (2007)"},{"key":"4_CR14_4","volume-title":"A formal model of obfuscation and negotiation for location privacy","author":"M Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Proceedings of International Conference on Pervasive Computing (2005)"},{"key":"4_CR15_4","unstructured":"FoxNews: Man accused of stalking ex-girlfriend with GPS. http:\/\/www.foxnews.com\/story\/0,2933,131487,00.html (2004)"},{"key":"4_CR16_4","volume-title":"Mix-zones for location privacy in vehicular networks","author":"J Freudiger","year":"2007","unstructured":"Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.P.: Mix-zones for location privacy in vehicular networks. In: Proceedings of the InternationalWorkshop onWireless Networking for Intelligent Transportation Systems (2007)"},{"key":"4_CR17_4","volume-title":"On the optimal placement of mix zones","author":"J Freudiger","year":"2009","unstructured":"Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: Proceedings of International Privacy Enhancing Technologies Symposium (2009)"},{"issue":"4","key":"4_CR18_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"B.C.M. Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys 42(4), 14:1\u201314:53 (2010)","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"4_CR19_4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1\u201318 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"4_CR20_4","volume-title":"Private queries in location based services: Anonymizers are not necessary","author":"G Ghinita","year":"2008","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: Anonymizers are not necessary. In: Proceedings of the ACM Conference on Management of Data (2008)"},{"key":"4_CR21_4","volume-title":"PRIV\u00b4 E: Anonymous location-based queries in distributed mobile systems","author":"G Ghinita","year":"2007","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIV\u00b4 E: Anonymous location-based queries in distributed mobile systems. In: Proceedings of the International Conference onWorldWideWeb (2007)"},{"key":"4_CR22_4","unstructured":"Ghinita1, G., Kalnis, P., Skiadopoulos, S.: MobiHide: A mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the International Symposium on Spatial and Temporal Databases (2007)"},{"key":"4_CR23_4","doi-asserted-by":"crossref","unstructured":"Gid\u00b4ofalvi, G., Huang, X., Pedersen, T.B.: Privacy-preserving data mining on moving object trajectories. In: Proceedings of the International Conference on Mobile Data Management (2007)","DOI":"10.1109\/MDM.2007.18"},{"key":"4_CR24_4","unstructured":"Google Geocoding API: http:\/\/code.google.com\/apis\/maps\/documentation\/geocoding\/"},{"key":"4_CR25_4","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"4_CR26_4","volume-title":"On the anonymity of periodic location samples","author":"M Gruteser","year":"2005","unstructured":"Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: Proceedings of the International Conference on Security in Pervasive Computing (2005)"},{"issue":"8","key":"4_CR27_4","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TMC.2010.62","volume":"9","author":"B Hoh","year":"2010","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Achieving guaranteed anonymity in GPS traces via uncertainty-aware path cloaking. IEEE Transactions on Mobile Computing 9(8), 1089\u20131107 (2010)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"4_CR28_4","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the International Conference on Mobile Systems, Applications, and Services (2004)","DOI":"10.1145\/990064.990087"},{"issue":"1","key":"4_CR29_4","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TKDE.2006.15","volume":"18","author":"H Hu","year":"2006","unstructured":"Hu, H., Lee, D.L.: Range nearest-neighbor query. IEEE Transactions on Knowledge and Data Engineering 18(1), 78\u201391 (2006)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"4_CR30_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1670679.1670682","volume":"42","author":"S. Ilarri","year":"2010","unstructured":"Ilarri, S., Mena, E., Illarramendi, A.: Location-dependent query processing: Where we are and where we are heading. ACM Computing Surveys 42(3), 12:1\u201312:73 (2010)","journal-title":"ACM Computing Surveys"},{"issue":"12","key":"4_CR31_4","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719\u20131733 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR32_4","volume-title":"Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy","author":"A Khoshgozaran","year":"2007","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the International Symposium on Spatial and Temporal Databases (2007)"},{"key":"4_CR33_4","volume-title":"An anonymous communication technique using dummies for location-based services","author":"H Kido","year":"2005","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of IEEE International Conference on Pervasive Services (2005)"},{"key":"4_CR34_4","volume-title":"Privacy protected query processing on spatial networks","author":"WS Ku","year":"2007","unstructured":"Ku, W.S., Zimmermann, R., Peng, W.C., Shroff, S.: Privacy protected query processing on spatial networks. In: Proceedings of the InternationalWorkshop on Privacy Data Management (2007)"},{"key":"4_CR35_4","volume-title":"Mondrian multidimensional k-anonymity","author":"K LeFevre","year":"2006","unstructured":"LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proceedings of the IEEE International Conference on Data Engineering (2006)"},{"issue":"7","key":"4_CR36_4","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TKDE.2009.139","volume":"22","author":"N Li","year":"2010","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: Closeness: A new privacy measure for data publishing. IEEE Transactions on Knowledge and Data Engineering 22(7), 943\u2013956 (2010)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR37_4","volume-title":"Privacy vulnerability of published anonymous mobility traces","author":"CY Ma","year":"2010","unstructured":"Ma, C.Y., Yau, D.K.Y., Yip, N.K., Rao, N.S.V.: Privacy vulnerability of published anonymous mobility traces. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (2010)"},{"issue":"1","key":"4_CR38_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data 1(1), 3:1\u20133:52 (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"4_CR39_4","unstructured":"Marist Institute for Public Opinion (MIPO): Half of Social Networkers Online Concerned about Privacy. http:\/\/maristpoll."},{"key":"4_CR40_4","unstructured":"marist.edu\/714-half-of-social-networkers-online-% concerned-about-privacy\/. July 14, 2010"},{"key":"4_CR41_4","volume-title":"Hiding stars with fireworks: Location privacy through camouage","author":"J Meyerowitz","year":"2009","unstructured":"Meyerowitz, J., Choudhury, R.R.: Hiding stars with fireworks: Location privacy through camouage. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (2009)"},{"key":"4_CR42_4","volume-title":"The new casper: Query procesing for location services without compromising privacy","author":"MF Mokbel","year":"2006","unstructured":"Mokbel, M.F., Chow, C.Y., Aref,W.G.: The new casper: Query procesing for location services without compromising privacy. In: Proceedings of the International Conference on Very Large Data Bases (2006)"},{"key":"4_CR43_4","volume-title":"Towards context and preference-aware location-based database systems","author":"MF Mokbel","year":"2009","unstructured":"Mokbel, M.F., Levandoski, J.: Towards context and preference-aware location-based database systems. In: Proceedings of the ACM International Workshop on Data Engineering for Wireless and Mobile Access (2009)"},{"issue":"1","key":"4_CR44_4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TKDE.2009.48","volume":"22","author":"K Mouratidis","year":"2010","unstructured":"Mouratidis, K., Yiu, M.L.: Anonymous query processing in road networks. IEEE Transactions on Knowledge and Data Engineering 22(1), 2\u201315 (2010)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"4_CR45_4","first-page":"47","volume":"2","author":"M.E. Nergiz","year":"2009","unstructured":"Nergiz, M.E., Atzori, M., Saygin, Y., G\u00a8uc\u00b8, B.: Towards trajectory anonymization: A generalization-based approach. Transactions on Data Privacy 2(1), 47\u201375 (2009)","journal-title":"Transactions on Data Privacy"},{"key":"4_CR46_4","volume-title":"Mobimix: Protecting location privacy with mix zones over road networks","author":"B Palanisamy","year":"2011","unstructured":"Palanisamy, B., Liu, L.: Mobimix: Protecting location privacy with mix zones over road networks. In: Proceedings of the IEEE International Conference on Data Engineering (2011)"},{"key":"4_CR47_4","volume-title":"Distortion-based anonymity for continuous queries in locationbased mobile services","author":"X Pan","year":"2009","unstructured":"Pan, X., Meng, X., Xu, J.: Distortion-based anonymity for continuous queries in locationbased mobile services. In: Proceedings of the ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (2009)"},{"key":"4_CR48_4","volume-title":"Anonymity, unobservability, and pseudonymity - a proposal for terminology","author":"A Pfitzmann","year":"2000","unstructured":"Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Proceedings of theWorkshop on Design Issues in Anonymity and Unobservability (2000)"},{"issue":"6","key":"4_CR49_4","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TAC.1979.1102177","volume":"24","author":"D Reid","year":"1979","unstructured":"Reid, D.: An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control 24(6), 843\u2013854 (1979)","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"6","key":"4_CR50_4","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR51_4","volume-title":"Exploring spatial datasets with histograms","author":"C Sun","year":"2002","unstructured":"Sun, C., Agrawal, D., Abbadi, A.E.: Exploring spatial datasets with histograms. In: Proceedings of the IEEE International Conference on Data Engineering (2002)"},{"issue":"5","key":"4_CR52_4","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"issue":"5","key":"4_CR53_4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"4_CR54_4","volume-title":"Privacy preservation in the publication of trajectories","author":"M Terrovitis","year":"2008","unstructured":"Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: Proceedings of the International Conference on Mobile Data Management (2008)"},{"key":"4_CR55_4","unstructured":"USAToday: Authorities: GPS system used to stalk woman. http:\/\/www.usatoday. com\/tech\/news\/2002-12-30-gps-stalker_x.htm (2002)"},{"issue":"7","key":"4_CR56_4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSPEC.2006.1652998","volume":"47","author":"J Voelcker","year":"2006","unstructured":"Voelcker, J.: Stalked by satellite: An alarming rise in gps-enabled harassment. IEEE Spectrum 47(7), 15\u201316 (2006)","journal-title":"IEEE Spectrum"},{"key":"4_CR57_4","volume-title":"Privacy-aware mobile services over road networks","author":"T Wang","year":"2009","unstructured":"Wang, T., Liu, L.: Privacy-aware mobile services over road networks. In: Proceedings of the International Conference on Very Large Data Bases (2009)"},{"key":"4_CR58_4","unstructured":"Webroot Software, Inc.: Webroot survey finds geolocation apps prevalent amongst mobile device users, but 55% concerned about loss of privacy. http:\/\/pr.webroot.com\/ threat-research\/cons\/social-networks-mobile-security-071310."},{"key":"4_CR59_4","unstructured":"html. July 13, 2010"},{"key":"4_CR60_4","volume-title":"The hardness and approximation algorithms for l-diversity","author":"X Xiao","year":"2010","unstructured":"Xiao, X., Yi, K., Tao, Y.: The hardness and approximation algorithms for l-diversity. In: Proceedings of the International Conference on Extending Database Technology (2010)"},{"issue":"1","key":"4_CR61_4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TITS.2009.2028872","volume":"11","author":"H Xie","year":"2010","unstructured":"Xie, H., Kulik, L., Tanin, E.: Privacy-aware traffic monitoring. IEEE Transactions on Intelligent Transportation Systems 11(1), 61\u201370 (2010)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"4_CR62_4","volume-title":"Location anonymity in continuous location-based services","author":"T Xu","year":"2007","unstructured":"Xu, T., Cai, Y.: Location anonymity in continuous location-based services. In: Proceedings of the ACM Symposium on Advances in Geographic Information Systems (2007)"},{"key":"4_CR63_4","volume-title":"Exploring historical location data for anonymity preservation in location-based services","author":"T Xu","year":"2008","unstructured":"Xu, T., Cai, Y.: Exploring historical location data for anonymity preservation in location-based services. In: Proceedings of IEEE INFOCOM (2008)"},{"key":"4_CR64_4","volume-title":"Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services","author":"ML Yiu","year":"2008","unstructured":"Yiu, M.L., Jensen, C., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of the IEEE International Conference on Data Engineering (2008)"},{"key":"4_CR65_4","volume-title":"Protecting moving trajectories with dummies","author":"TH You","year":"2007","unstructured":"You, T.H., Peng, W.C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of the International Workshop on Privacy-Aware Location-Based Mobile Services (2007)"},{"issue":"2","key":"4_CR66_4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10707-008-0047-2","volume":"13","author":"C Zhang","year":"2009","unstructured":"Zhang, C., Huang, Y.: Cloaking locations for anonymous location based services: A hybrid approach. GeoInformatica 13(2), 159\u2013182 (2009)","journal-title":"GeoInformatica"}],"container-title":["Computing with Spatial Trajectories"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-1629-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T14:18:28Z","timestamp":1706192308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-1629-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781461416289","9781461416296"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-1629-6_4","relation":{},"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"26 September 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}