{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:08:32Z","timestamp":1743131312163,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_24","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"303-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Movement Trajectories Through Fragmentation"],"prefix":"10.1007","author":[{"given":"Marius","family":"Wernke","sequence":"first","affiliation":[]},{"given":"Frank","family":"D\u00fcrr","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Rothermel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Ardagna, C., Livraga, G., Samarati, P.: Protecting privacy of user information in continuous location-based services. In: IEEE 15th International Conference on Computational Science and Engineering, pp. 162\u2013169 (2012)","DOI":"10.1109\/ICCSE.2012.31"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Comput."},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Advances in Spatial and Temporal Databases","author":"C-Y Chow","year":"2007","unstructured":"Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258\u2013275. Springer, Heidelberg (2007)"},{"issue":"4","key":"24_CR4","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MPRV.2011.18","volume":"10","author":"M Damiani","year":"2011","unstructured":"Damiani, M., Silvestri, C., Bertino, E.: Fine-grained cloaking of sensitive positions in location-sharing applications. Pervasive Comput. 10(4), 64\u201372 (2011)","journal-title":"Pervasive Comput."},{"key":"24_CR5","unstructured":"DATALOSSDB, June 2013. www.datalossdb.org"},{"issue":"12","key":"24_CR6","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719\u20131733 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Krumm, J.: A Markov model for driver turn prediction. In: Society of Automotive Engineers (SAE) World Congress (2008)","DOI":"10.4271\/2008-01-0195"},{"issue":"1","key":"24_CR8","first-page":"47","volume":"2","author":"ME Nergiz","year":"2009","unstructured":"Nergiz, M.E., Atzori, M., Saygin, Y., G\u00fc\u00e7, B.: Towards trajectory anonymization: a generalization-based approach. Trans. Data Priv. 2(1), 47\u201375 (2009)","journal-title":"Trans. Data Priv."},{"key":"24_CR9","unstructured":"OpenStreetMap, June 2013. www.openstreetmap.org"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Peddinti, S.T., Saxena, N.: On the limitations of query obfuscation techniques for location privacy. In: Proceedings of the 13th International Conference on Ubiquitous Computing (2011)","DOI":"10.1145\/2030112.2030139"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Piorkowski, M., Sarafijanovoc-Djukic, N., Grossglauser, M.: A parsimonious model of mobile partitioned networks with clustering. In: The First International Conference on COMmunication Systems and NETworkS, pp. 1\u201310 (2009)","DOI":"10.1109\/COMSNETS.2009.4808865"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Shankar, P., Ganapathy, V., Iftode, L.: Privately querying location-based services with sybilquery. In: Proceedings of the 11th International Conference on Ubiquitous Computing (2009)","DOI":"10.1145\/1620545.1620550"},{"key":"24_CR13","unstructured":"Webroot, June 2013. http:\/\/www.webroot.com\/us\/en\/company\/press-room\/releases\/social-networks-mobile-security"},{"key":"24_CR14","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.pmcj.2013.01.001","volume":"9","author":"M Wernke","year":"2013","unstructured":"Wernke, M., D\u00fcrr, F., Rothermel, K.: PShare: ensuring location privacy in non-trusted systems through multi-secret sharing. Pervasive Mob. Comput. 9, 339\u2013352 (2013)","journal-title":"Pervasive Mob. Comput."},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00779-011-0372-6","volume":"16","author":"M Wernke","year":"2012","unstructured":"Wernke, M., Skvortsov, P., D\u00fcrr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 16, 1\u201313 (2012)","journal-title":"Pers. Ubiquit. Comput."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T11:53:06Z","timestamp":1676893986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_24","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}