{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:32:23Z","timestamp":1771612343022,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319085920","type":"print"},{"value":"9783319085937","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08593-7_10","type":"book-chapter","created":{"date-parts":[[2014,6,23]],"date-time":"2014-06-23T12:55:19Z","timestamp":1403528119000},"page":"143-160","source":"Crossref","is-referenced-by-count":5,"title":["PrivLoc: Preventing Location Tracking in Geofencing Services"],"prefix":"10.1007","author":[{"given":"Jens Mathias","family":"Bohli","sequence":"first","affiliation":[]},{"given":"Dan","family":"Dobre","sequence":"additional","affiliation":[]},{"given":"Ghassan O.","family":"Karame","sequence":"additional","affiliation":[]},{"given":"Wenting","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Foursquare, http:\/\/foursquare.com\/"},{"key":"10_CR2","unstructured":"Keep Track of Your Kids With Geofences, http:\/\/netsecurity.about.com\/od\/newsandeditoria2\/a\/Keeping-Tabs-On-Your-Kids-With-Geofences.htm"},{"key":"10_CR3","unstructured":"Location Based Notifications, http:\/\/www.plotprojects.com\/"},{"key":"10_CR4","unstructured":"Valtus Spatial Data Cloud Services, http:\/\/www.valtus.com\/products\/vault-spatial-data-cloud-services\/"},{"key":"10_CR5","unstructured":"Yelp, http:\/\/www.yelp.com\/"},{"key":"10_CR6","first-page":"237","volume-title":"Proceedings of the 17th International Conference on World Wide Web, WWW 2008","author":"B. Bamba","year":"2008","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting Anonymous Location Queries in Mobile Environments with Privacygrid. In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, pp. 237\u2013246. ACM, New York (2008)"},{"key":"10_CR7","unstructured":"Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: INTEREACT, pp. 709\u2013712 (2003)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-45760-7_9","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J.A. Black","year":"2002","unstructured":"Black, J.A., Rogaway, P.: Ciphers with Arbitrary Finite Domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 114\u2013130. Springer, Heidelberg (2002)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A. Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 224\u2013241. Springer, Heidelberg (2009)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Advances in Spatial and Temporal Databases","author":"C.-Y. Chow","year":"2007","unstructured":"Chow, C.-Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol.\u00a04605, pp. 258\u2013275. Springer, Heidelberg (2007)"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C. Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol.\u00a04978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B. Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing\u00a07(1), 1\u201318 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private Queries in Location Based Services: Anonymizers Are Not Necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, pp. 121\u2013132. ACM (2008)","DOI":"10.1145\/1376616.1376631"},{"key":"10_CR15","first-page":"31","volume-title":"Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003, pp. 31\u201342. ACM, New York (2003)"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","volume":"2","author":"M. Gruteser","year":"2004","unstructured":"Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy\u00a02(2), 28\u201334 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"10_CR17","first-page":"14","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI 2012","author":"S. Guha","year":"2012","unstructured":"Guha, S., Jain, M., Padmanabhan, V.N.: Koi: A Location-privacy Platform for Smartphone Apps. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI 2012, p. 14. USENIX Association, Berkeley (2012)"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/602259.602266","volume-title":"Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, SIGMOD 1984","author":"A. Guttman","year":"1984","unstructured":"Guttman, A.: R-trees: A Dynamic Index Structure for Spatial Searching. In: Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, SIGMOD 1984, pp. 47\u201357. ACM, New York (1984)"},{"key":"10_CR19","first-page":"177","volume-title":"Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, MobiSys 2004","author":"J.I. Hong","year":"2004","unstructured":"Hong, J.I., Landay, J.A.: An Architecture for Privacy-sensitive Ubiquitous Computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, MobiSys 2004, pp. 177\u2013189. ACM, New York (2004)"},{"issue":"12","key":"10_CR20","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P. Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Trans. on Knowl. and Data Eng.\u00a019(12), 1719\u20131733 (2007)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique using Dummies for Location-based Services. In: ICPS, pp. 88\u201397 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"10_CR22","unstructured":"Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The New Casper: Query Processing for Location Services Without Compromising Privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763\u2013774. VLDB Endowment (2006)"},{"key":"10_CR23","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1145\/775152.775168","volume-title":"Proceedings of the 12th International Conference on World Wide Web, WWW 2003","author":"J. Myllymaki","year":"2003","unstructured":"Myllymaki, J., Kaufman, J.: High-performance spatial indexing for location-based services. In: Proceedings of the 12th International Conference on World Wide Web, WWW 2003, pp. 112\u2013117. ACM, New York (2003)"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-14527-8_6","volume-title":"Privacy Enhancing Technologies","author":"F. Olumofin","year":"2010","unstructured":"Olumofin, F., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving Efficient Query Privacy for Location Based Services. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol.\u00a06205, pp. 93\u2013110. Springer, Heidelberg (2010)"},{"key":"10_CR25","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management? A Consolidated Proposal for Terminology. Fachterminologie Datenschutz und Datensicherheit, 111\u2013144 (2008)"},{"issue":"6","key":"10_CR26","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE Trans. on Knowl. and Data Eng.\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"issue":"1","key":"10_CR28","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/69.755614","volume":"11","author":"S. Shekhar","year":"1999","unstructured":"Shekhar, S., Chawla, S., Ravada, S., Fetterer, A., Liu, X., Lu, C.-T.: Spatial databases-accomplishments and research needs. IEEE Trans. on Knowl. and Data Eng.\u00a011(1), 45\u201355 (1999)","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-642-01516-8_19","volume-title":"Pervasive Computing","author":"A. Sheth","year":"2009","unstructured":"Sheth, A., Seshan, S., Wetherall, D.: Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol.\u00a05538, pp. 274\u2013290. Springer, Heidelberg (2009)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Le Boudec, J., Hubaux, J.P.: Quantifying location privacy. In: Proceedings of the IEEE Symposium on Security and Privacy (2011)","DOI":"10.1109\/SP.2011.18"},{"issue":"5","key":"10_CR31","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving K-anonymity Privacy Protection Using Generalization and Suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 571\u2013588 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"5","key":"10_CR32","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: A Model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xu, D., He, X., Zhang, C., Li, F., Xu, B.: L2P2: Location-aware location privacy protection for location-based services. In: INFOCOM, pp. 1996\u20132004 (2012)","DOI":"10.1109\/INFCOM.2012.6195577"},{"issue":"3","key":"10_CR34","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00778-009-0169-7","volume":"19","author":"M.L. Yiu","year":"2010","unstructured":"Yiu, M.L., Ghinita, G., Jensen, C.S., Kalnis, P.: Enabling Search Services on Outsourced Private Spatial Data. The VLDB Journal\u00a019(3), 363\u2013384 (2010)","journal-title":"The VLDB Journal"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08593-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T03:06:14Z","timestamp":1649473574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08593-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319085920","9783319085937"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08593-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}