{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:57:58Z","timestamp":1742943478466,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319098845"},{"type":"electronic","value":"9783319098852"}],"license":[{"start":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T00:00:00Z","timestamp":1408665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T00:00:00Z","timestamp":1408665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-09885-2_10","type":"book-chapter","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T16:49:14Z","timestamp":1408639754000},"page":"169-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy for LBSs: On Using a Footprint Model to Face the Enemy"],"prefix":"10.1007","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[]},{"given":"Roberto Di","family":"Pietro","sequence":"additional","affiliation":[]},{"given":"Luciana","family":"Marconi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,22]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Ardagna, C., Cremonini, M., De Capitani di Vimercati S., Samarati, P.: An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable Secure Comput. 8(1),13\u201327 (2011)","DOI":"10.1109\/TDSC.2009.25"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Balsa, E., Troncoso, C., D\u00edaz, C.: Ob-pws: obfuscation-based private web search. In: IEEE Symposium on Security and Privacy, pp. 491\u2013505 (2012)","DOI":"10.1109\/SP.2012.36"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Comput."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Proceedings of the 2nd VLDB Workshop on Secure Data Management, pp. 185\u2013199 (2005)","DOI":"10.1007\/11552338_13"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Chow, C., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: GIS \u201906: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171\u2013178 (2006)","DOI":"10.1145\/1183471.1183500"},{"key":"10_CR6","unstructured":"Damiani, M.L., Bertino, E., Silvestri, C.: The probe framework for the personalized cloaking of private locations. Trans. Data Priv. 3(2), 123\u2013148 (2010)"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Domingo-Ferrer, J.: k-anonymity. In: Liu, L., \u00d6zsu, M.T., (eds. ) Encyclopedia of Database Systems, p. 1585. Springer, US (2009). doi:10.1007\/978-0-387-39940-9_1503. http:\/\/dx.doi.org\/10.1007\/978-0-387-39940-9_1503","DOI":"10.1007\/978-0-387-39940-9_1503"},{"key":"10_CR8","unstructured":"Electronic toll collection california (USA). http:\/\/www.bayareafastrak.org"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Manshaei M.H., Hubaux J., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: CCS \u201909: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 324\u2013337 (2009)","DOI":"10.1145\/1653662.1653702"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Manshaei, M.H., Le Boudec, J., Hubaux, J.: On the age of pseudonyms in mobile ad hoc networks. In: INFOCOM: \u201910: Proceedings of the 29th IEEE International Conference on Computer Communications, pp. 1577\u20131585 (2010)","DOI":"10.1109\/INFCOM.2010.5461975"},{"key":"10_CR11","unstructured":"Freudiger, J., Raya M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.: Mix-zones for location privacy in vehicular networks. In: Win-ITS \u201907: Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (2007)."},{"key":"10_CR12","unstructured":"Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS \u201905: Proceedings of the 25th International Conference on Distributed Computing Systems, pp. 620\u2013629 (2005)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A, Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD \u201908: Proceedings of the 2008 ACM SIGMOD international Conference on Management of Data, pp. 121\u2013132 (2008)","DOI":"10.1145\/1376616.1376631"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys \u201903: Proceedings of the 1st International Conference on Mobile systems, Applications and Services, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"2","key":"10_CR15","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","volume":"2","author":"M Gruteser","year":"2004","unstructured":"Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Secur. Priv. 2(2), 28\u201334 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"10_CR16","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers Inc., San Francisco (2006)"},{"key":"10_CR17","unstructured":"Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM \u201905: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 194\u2013205 (2005)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: CCS \u201907: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 161\u2013171 (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS \u201905: Proceedings of IEEE International Conference on Pervasive Services, pp. 88\u201397 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Kirmse, A., Udeshi, T., Bellver, P., Shuma, J.: Extracting patterns from location history. In: ACM SIGSPATIAL GIS 2011, pp. 397\u2013400. http:\/\/www.sigspatial.org\/ (2011)","DOI":"10.1145\/2093973.2094032"},{"issue":"6","key":"10_CR21","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Pers. Ubiquitous Comput. 13(6), 391\u2013399 (2009)","journal-title":"Pers. Ubiquitous Comput."},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: SIGMOD \u201905: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"10_CR23","unstructured":"London congestion charge. http:\/\/www.tfl.gov.uk\/roadusers\/"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Marconi, L., Di Pietro, R., Crispo, B., Conti, M.: Time in privacy preserving LBSs: An overlooked dimension. Int. J. Veh. Technol. 2011, article ID: 486975, 1\u201312 (2011)","DOI":"10.1155\/2011\/486975"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Marconi, L., Di Pietro, R., Crispo, B., Conti, M.: Time warp: how time affects privacy in LBSs. In: ICICS \u201910: Proceedings of the Twelfth International Conference on Information and Communications Security, pp. 325\u2013339 (2010)","DOI":"10.1007\/978-3-642-17650-0_23"},{"key":"10_CR26","unstructured":"Microsoft: Geolife\u2014building social networks using human location history. http:\/\/research.microsoft.com\/en-us\/projects\/geolife\/ (2008)"},{"key":"10_CR27","unstructured":"Mokbel, M.F., Chow, C., Aref, W. G.: The new casper: query processing for location services without compromising privacy. In: VLDB \u201906: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763\u2013774 (2006)"},{"issue":"6","key":"10_CR28","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1016\/j.comcom.2009.11.024","volume":"33","author":"D Rebollo-Monedero","year":"2010","unstructured":"Rebollo-Monedero, D., Forn\u00e9, J., Solanas, A., Mart\u00ednez-Ballest\u00e9, A.: Private location-based information retrieval through user collaboration. Comput. Commun. 33(6), 762\u2013774 (2010)","journal-title":"Comput. Commun."},{"key":"10_CR29","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1998)"},{"key":"10_CR30","unstructured":"Sch\u00fcessler, N., Axhausen, K.W.: Identifying trips and activities and their characteristics from GPS raw data without further information. ETH, Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich, IVT (2008). http:\/\/dx.doi.org\/10.3929\/ethz-a-005589980"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: PET\u2019 02: Proceedings of Privacy Enhancing Technologies Workshop, pp. 41\u201353 (2002)","DOI":"10.1007\/3-540-36467-6_4"},{"key":"10_CR32","unstructured":"Shokri, R., Freudiger, J., Hubaux, J.: Unified framework for location privacy. In: PETS \u201910: Proceedings of the 10th Privacy Enhancing Technologies Symposium, pp. 203\u2013214 (2010)"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Shokri, R., Troncoso, C., D\u00edaz, C., Freudiger, J., Hubaux, J.-P.: Unraveling an old cloak: k-anonymity for location privacy. In: WPES \u201910: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115\u2013118, New York, NY, USA (2010)","DOI":"10.1145\/1866919.1866936"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Solanas, A., Di Pietro, R.:. A linear-time multivariate micro-aggregation for privacy protection in uniform very large data sets. In: MDAI \u201908: Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence, pp. 203\u2013214 (2008)","DOI":"10.1007\/978-3-540-88269-5_19"},{"issue":"6","key":"10_CR35","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1016\/j.comcom.2008.01.007","volume":"31","author":"A Solanas","year":"2008","unstructured":"Solanas, A., Mart\u00ednez-Ballest\u00e9, A.: A ttp-free protocol for location privacy in location-based services. Comput. Commun. 31(6), 1181\u20131191 (2008)","journal-title":"Comput. Commun."},{"issue":"10","key":"10_CR36","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"5","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Syst. 5(10), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Syst."},{"issue":"12","key":"10_CR37","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1287\/isre.12.1.83.9715","volume":"1","author":"H Thomas","year":"2001","unstructured":"Thomas, H., Datta, A.: A conceptual model and algebra for on-line analytical processing in decision support databases. Inf. Syst. Res. 1(12), 83\u2013102 (2001)","journal-title":"Inf. Syst. Res."},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Location anonymity in continuous location-based services. In: GIS \u201907: Proceedings of the 15th Annual ACM International Symposium On Advances in Geographic Information Systems, pp. 1\u20138 (2007)","DOI":"10.1145\/1341012.1341062"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Exploring historical location data for anonimity preservation in location-based services. In: INFOCOM 2008: Proceedings of the 27th IEEE Conference on Computer Communications, pp. 547\u2013555 (2008)","DOI":"10.1109\/INFOCOM.2008.103"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: CCS\u2019 09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 348\u2013357 (2009)","DOI":"10.1145\/1653662.1653704"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Chen, Y., Li, Q., Xie, Ma, W.-Y., Xing, X.: Understanding trasportation modes based on gps data for web applications. ACM Trans. Web 4, 1\u201336 (2010)","DOI":"10.1145\/1658373.1658374"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, Q., Chen, Y., Xie, X.: Understanding mobility based on gps data. In: UbiComp 2008: Proceedings of ACM International Conference on Ubiquitous Computing, pp. 312\u2013321 (2008)","DOI":"10.1145\/1409635.1409677"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, Q., Wang, L., Xie, X.: Learning trasportation modes from raw gps data for geographic application on the web. In: WWW 2008: Proceedings of the 17th International Conference on World Wide Web, pp. 247\u2013256 (2008)","DOI":"10.1145\/1367497.1367532"}],"container-title":["Studies in Computational Intelligence","Advanced Research in Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09885-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T10:13:43Z","timestamp":1676888023000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09885-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,22]]},"ISBN":["9783319098845","9783319098852"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09885-2_10","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,8,22]]},"assertion":[{"value":"22 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}