{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:31:54Z","timestamp":1743028314026,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_4","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"35-45","source":"Crossref","is-referenced-by-count":0,"title":["Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks"],"prefix":"10.1007","author":[{"given":"Hongyun","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mengzhen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiayi","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Mokbel, M.F.: Privacy in location-based services: state-of -the-art and research directions. In: Proceedings of the 8th International Conference on Mobile Data Management, p. 228 (2007)","key":"4_CR1","DOI":"10.1109\/MDM.2007.45"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-75177-9_5","volume-title":"Mobility, Data Mining And Privacy","author":"D Pedreschi","year":"2008","unstructured":"Pedreschi, D., Bonchi, F., Turini, F., Verykios, V.S., Atzori, M., Malin, B., Moelans, B., Saygin, Y.: Privacy protection: regulations and technologies, opportunities and threats. In: Giannotti, F., Pedreschi, D. (eds.) Mobility, Data Mining And Privacy, pp. 101\u2013119. Springer, Berlin (2008)"},{"issue":"5","key":"4_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location- based services through spatial and temporal cloaking. In: Proceedings of the first International Conference on Mobile Systems, Applications, and Services. San Francisco, CA, USA, pp. 163\u2013168 (2003)","key":"4_CR4","DOI":"10.1145\/1066116.1189037"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"CA Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47\u201360. Springer, Heidelberg (2007)"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.14778\/1687627.1687745","volume":"2","author":"T Wang","year":"2009","unstructured":"Wang, T., Liu, L.: Privacy-aware mobile services over road networks. Proc. VLDB Endow. 2(1), 1042\u20131053 (2009)","journal-title":"Proc. VLDB Endow."},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TKDE.2009.48","volume":"22","author":"K Mouratidis","year":"2010","unstructured":"Mouratidis, K., Yiu, M.L.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. TKDE 22(1), 2\u201315 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng. TKDE"},{"issue":"5","key":"4_CR8","doi-asserted-by":"publisher","first-page":"865","DOI":"10.3724\/SP.J.1016.2011.00865","volume":"34","author":"J Xue","year":"2011","unstructured":"Xue, J., Liu, X., Yang, X., et al.: A location privacy preserving approach on road networks. Chin. J. Comput. 34(5), 865\u2013878 (2011). (In Chinese)","journal-title":"Chin. J. Comput."},{"unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, pp. 763\u2013774 (2006)","key":"4_CR9"},{"issue":"1","key":"4_CR10","first-page":"97","volume":"42","author":"X Hong-Yun","year":"2014","unstructured":"Hong-Yun, X., Jun, X., Gong, Y.-J., Meng-Zhen, X.: Algorithms to generate location privacy area based on location privacy protection with spatial cloaking. J. S. Chin. Univ. Technol. (Nat. Sci. Ed.) 42(1), 97\u2013103 (2014). (in Chinese)","journal-title":"J. S. Chin. Univ. Technol. (Nat. Sci. Ed.)"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., et al.: L-diversity: privacy beyond k-anonymity. In: Proceedings of 22nd International Conference on Data Engineering, Atlanta, Georgia, USA, pp. 24\u201336 (2006)","key":"4_CR11","DOI":"10.1109\/ICDE.2006.1"},{"issue":"6","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1214\/aoms\/1177699147","volume":"37","author":"LE Baum","year":"1966","unstructured":"Baum, L.E., Petrie, T.: Statistical inference for probabilistic functions of finite state Markov chains. Ann. Math. Stat. 37(6), 1554\u20131563 (1966)","journal-title":"Ann. Math. Stat."},{"issue":"2","key":"4_CR13","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff, T.: A framework for generating network-based moving objects. GeoInfomatica 6(2), 153\u2013180 (2002)","journal-title":"GeoInfomatica"},{"issue":"3","key":"4_CR14","first-page":"268","volume":"1","author":"X Pan","year":"2007","unstructured":"Pan, X., Xiao, Z., Meng, X.: Survey of location privacy-preserving. J. Front. Comput. Sci. Technol. 1(3), 268\u2013281 (2007). (In Chinese)","journal-title":"J. Front. Comput. Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:56:55Z","timestamp":1559303815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}