{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:17:11Z","timestamp":1726003031474},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050627"},{"type":"electronic","value":"9783030050634"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05063-4_17","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T00:23:45Z","timestamp":1544142225000},"page":"204-219","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Differentially Private Location Protection with Continuous Time Stamps for VANETs"],"prefix":"10.1007","author":[{"given":"Zhili","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xianyue","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Zuobin","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 901\u2013914. ACM (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Advances in Spatial and Temporal Databases","author":"C-Y Chow","year":"2007","unstructured":"Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258\u2013275. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73540-3_15"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Cui, J., Wen, J., Han, S., Zhong, H.: Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network. IEEE Internet Things J. (2018)","DOI":"10.1109\/JIOT.2018.2797206"},{"issue":"12","key":"17_CR4","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TMC.2012.208","volume":"12","author":"R Dewri","year":"2013","unstructured":"Dewri, R.: Local differential perturbations: location privacy under approximate knowledge attackers. IEEE Trans. Mob. Comput. 12(12), 2360\u20132372 (2013)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 121\u2013132. ACM (2008)","DOI":"10.1145\/1376616.1376631"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: 2015 IEEE 31st International Conference on Data Engineering (ICDE), pp. 1023\u20131034. IEEE (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-72037-9_8","volume-title":"Pervasive Computing","author":"J Krumm","year":"2007","unstructured":"Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127\u2013143. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72037-9_8"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/LCOMM.2016.2637902","volume":"21","author":"J Lim","year":"2017","unstructured":"Lim, J., Yu, H., Kim, K., Kim, M., Lee, S.B.: Preserving location privacy of connected vehicles with highly accurate location updates. IEEE Commun. Lett. 21(3), 540\u2013543 (2017)","journal-title":"IEEE Commun. Lett."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2007, pp. 94\u2013103. IEEE (2007)","DOI":"10.1109\/FOCS.2007.66"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TKDE.2009.48","volume":"22","author":"K Mouratidis","year":"2010","unstructured":"Mouratidis, K., Yiu, M.L.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22(1), 2\u201315 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"17_CR13","doi-asserted-by":"publisher","first-page":"692","DOI":"10.14778\/2212351.2212352","volume":"5","author":"K Mouratidis","year":"2012","unstructured":"Mouratidis, K., Yiu, M.L.: Shortest path computation with no information leakage. Proc. VLDB Endow. 5(8), 692\u2013703 (2012)","journal-title":"Proc. VLDB Endow."},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TMC.2014.2321747","volume":"14","author":"B Palanisamy","year":"2015","unstructured":"Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans. Mob. Comput. 14(3), 495\u2013508 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Pan, X., Meng, X., Xu, J.: Distortion-based anonymity for continuous queries in location-based mobile services. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 256\u2013265. ACM (2009)","DOI":"10.1145\/1653771.1653808"},{"issue":"8","key":"17_CR16","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2012","unstructured":"Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506\u20131519 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Shin, H., Vaidya, J., Atluri, V., Choi, S.: Ensuring privacy and security for LBS through trajectory partitioning. In: 2010 Eleventh International Conference on Mobile Data Management (MDM), pp. 224\u2013226. IEEE (2010)","DOI":"10.1109\/MDM.2010.29"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1298\u20131309. ACM (2015)","DOI":"10.1145\/2810103.2813640"},{"issue":"3","key":"17_CR19","doi-asserted-by":"publisher","first-page":"223","DOI":"10.3233\/JHS-160544","volume":"22","author":"WD Yang","year":"2016","unstructured":"Yang, W.D., Gao, Z.M., Wang, K., Liu, H.Y.: A privacy-preserving data aggregation mechanism for vanets. J. High Speed Netw. 22(3), 223\u2013230 (2016)","journal-title":"J. High Speed Netw."},{"issue":"5","key":"17_CR20","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/TKDE.2012.90","volume":"25","author":"X Yi","year":"2013","unstructured":"Yi, X., Kaosar, M.G., Paulet, R., Bertino, E.: Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 25(5), 1125\u20131134 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"17_CR21","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/LCOMM.2013.070113.122816","volume":"17","author":"B Ying","year":"2013","unstructured":"Ying, B., Makrakis, D., Mouftah, H.T.: Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 17(8), 1524\u20131527 (2013)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"17_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2015.2399291","volume":"13","author":"R Yu","year":"2016","unstructured":"Yu, R., Kang, J., Huang, X., Xie, S., Zhang, Y., Gjessing, S.: MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans. Dependable Secur. Comput. 13(1), 93\u2013105 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"17_CR23","unstructured":"Zheng, Y.: T-drive trajectory data sample, August 2011. https:\/\/www.microsoft.com\/en-us\/research\/publication\/t-drive-trajectory-data-sample\/"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05063-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T23:17:53Z","timestamp":1573082273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05063-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050627","9783030050634"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05063-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}