{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:03:07Z","timestamp":1772064187917,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319006147","type":"print"},{"value":"9783319006154","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-00615-4_13","type":"book-chapter","created":{"date-parts":[[2013,5,11]],"date-time":"2013-05-11T02:49:31Z","timestamp":1368240571000},"page":"225-245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Privacy-Preserving Distributed Movement Data Aggregation"],"prefix":"10.1007","author":[{"given":"Anna","family":"Monreale","sequence":"first","affiliation":[]},{"given":"Wendy Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Pratesi","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"Rinzivillo","sequence":"additional","affiliation":[]},{"given":"Dino","family":"Pedreschi","sequence":"additional","affiliation":[]},{"given":"Gennady","family":"Andrienko","sequence":"additional","affiliation":[]},{"given":"Natalia","family":"Andrienko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,12]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the 2008 IEEE 24th international conference on data engineering (ICDE), pp 376\u2013385","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"13_CR2","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TVCG.2010.44","volume":"17","author":"N Andrienko","year":"2011","unstructured":"Andrienko N, Andrienko G (2011) Spatial generalization and aggregation of massive movement data. IEEE Trans Visual Comput Graphics 17:205\u2013219","journal-title":"IEEE Trans Visual Comput Graphics"},{"key":"13_CR3","unstructured":"Backes M, Meiser S (2012) Differentially private smart metering with battery recharging. IACR cryptology ePrint archive, p 183"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Barak B, Chaudhuri K, Dwork C, Kale S, McSherry F, Talwar K (2007) Privacy, accuracy, and consistency too: a holsistic solution to contingency table release. In: Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS), pp 273\u2013282","DOI":"10.1145\/1265530.1265569"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Bhaskar R, Laxman S, Smith A, Thakurta A (2010) Discovering frequent patterns in sensitive data. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining (KDD), pp 503\u2013512","DOI":"10.1145\/1835804.1835869"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Chen R, Fung BCM, Desai BC, Sossou NM (2012) Differentially private transit data publication: a case study on the montreal transportation system. In: Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining (KDD), pp 213\u2013221","DOI":"10.1145\/2339530.2339564"},{"issue":"1","key":"13_CR7","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","volume":"55","author":"G Cormode","year":"2005","unstructured":"Cormode G, Muthukrishnan S (2005) An improved data stream summary: the count-min sketch and its applications. J Algorithms 55(1):58\u201375","journal-title":"J Algorithms"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Cormode G, Garofalakis MN (2008) Approximate continuous querying over distributed streams. ACM Trans Database Syst 33(2)","DOI":"10.1145\/1366102.1366106"},{"issue":"1\u20133","key":"13_CR9","first-page":"1","volume":"4","author":"G Cormode","year":"2012a","unstructured":"Cormode G, Garofalakis MN, Haas PJ, Jermaine C (2012a) Synopses for massive data: samples, histograms, wavelets, sketches. Found Trends Databases 4(1\u20133):1\u2013294","journal-title":"Found Trends Databases"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Cormode G, Procopiuc CM, Srivastava D, Shen E, Yu T (2012b) Differentially private spatial decompositions. In: ICDE, pp 20\u201331","DOI":"10.1109\/ICDE.2012.16"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Cormode G, Procopiuc CM, Srivastava D, Tran TTL (2012c) Differentially private summaries for sparse data. In: ICDT, pp 299\u2013311","DOI":"10.1145\/2274576.2274608"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Ding B, Winslett M, Han J, Li Z (2011) Differentially private data cubes: optimizing noise sources and consistency. In: Proceedings of the 2011 ACM SIGMOD international conference on management of data, pp 217\u2013228","DOI":"10.1145\/1989323.1989347"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd conference on theory of cryptography (TCC), pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Feldman D, Fiat A, Kaplan H, Nissim K (2009) Private coresets. In: Proceedings of the 41st annual ACM symposium on theory of computing (STOC), pp 361\u2013370","DOI":"10.1145\/1536414.1536465"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Friedman A, Schuster A (2010) Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 493\u2013502","DOI":"10.1145\/1835804.1835868"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Hay M, Rastogi V, Miklau G, Suciu D (Sep 2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1\u20132):1021\u20131032","DOI":"10.14778\/1920841.1920970"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Kifer D, Machanavajjhala A (2011) No free lunch in data privacy. In: Sellis TK, Miller RJ, Kementsietsidis A, Velegrakis Y (eds) ACM-SIGMOD conference, pp 193\u2013204","DOI":"10.1145\/1989323.1989345"},{"issue":"11","key":"13_CR18","first-page":"1340","volume":"5","author":"N Li","year":"2012","unstructured":"Li N, Qardaji WH, Su D, Cao J (2012) Privbasis: frequent itemset mining with differential privacy. PVLDB 5(11):1340\u20131351","journal-title":"PVLDB"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"McSherry F, Mahajan R (2010) Differentially-private network trace analysis. In: Proceedings of the ACM SIGCOMM 2010 conference, pp 123\u2013134","DOI":"10.1145\/1851182.1851199"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Proceedings of the 48th annual IEEE symposium on foundations of computer science (FOCS), pp 94\u2013103","DOI":"10.1109\/FOCS.2007.66"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Mohammed N, Chen R, Fung BCM, Yu PS (2011) Differentially private data release for data mining. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/2020408.2020487"},{"issue":"2","key":"13_CR22","first-page":"91","volume":"3","author":"A Monreale","year":"2010","unstructured":"Monreale A, Andrienko GL, Andrienko NV, Giannotti F, Pedreschi D, Rinzivillo S, Wrobel S (2010) Movement data anonymity through generalization. Trans Data Priv 3(2):91\u2013121","journal-title":"Trans Data Priv"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Rastogi V, Nath S (2010) Differentially private aggregation of distributed time-series with transformation and encryption. In: SIGMOD, pp 735\u2013746","DOI":"10.1145\/1807167.1807247"},{"key":"13_CR24","unstructured":"Samarati P, Sweeney L (1998a) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppresion. In: Proceedings of the IEEE symposium on research in security and privacy, pp 384\u2013393"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Samarati P, Sweeney L (1998b) Generalizing data to provide anonymity when disclosing information(abstract). In: Proceedings of the 17th ACM symposium on principles of, database systems (PODS)","DOI":"10.1145\/275487.275508"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: Proceedings of the 9th international conference on mobile data management (MDM)","DOI":"10.1109\/MDM.2008.29"},{"issue":"8","key":"13_CR27","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2011","unstructured":"Xiao X, Wang G, Gehrke J (Aug 2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200\u20131214","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Xu J, Zhang Z, Xiao X, Yang Y, Yu G (2012) Differentially private histogram publication. In: ICDE, pp 32\u201343","DOI":"10.1109\/ICDE.2012.48"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Yarovoy R, Bonchi F, Lakshmanan LVS, Wang WH (2009) Anonymizing moving objects: how to hide a mob in a crowd? In: EDBT, pp 72\u201383","DOI":"10.1145\/1516360.1516370"}],"container-title":["Lecture Notes in Geoinformation and Cartography","Geographic Information Science at the Heart of Europe"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00615-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T17:42:25Z","timestamp":1558374145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-00615-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319006147","9783319006154"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00615-4_13","relation":{},"ISSN":["1863-2246","1863-2351"],"issn-type":[{"value":"1863-2246","type":"print"},{"value":"1863-2351","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"12 May 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}