{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:49:41Z","timestamp":1743126581445,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319590400"},{"type":"electronic","value":"9783319590417"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59041-7_3","type":"book-chapter","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T02:43:06Z","timestamp":1493865786000},"page":"41-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Preserving Discovery of Nearby-Friends"],"prefix":"10.1007","author":[{"given":"Maryam","family":"Hezaveh","sequence":"first","affiliation":[]},{"given":"Carlisle","family":"Adams","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,5]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.pmcj.2006.12.002","volume":"3","author":"A Amir","year":"2007","unstructured":"Amir, A., Efrat, A., Myllymaki, J., Palaniappan, L., Wampler, K.: Buddy istracking \u2013 efficient proximity detection among mobile friends. Pervasive Mob. Comput. 3, 489\u2013511 (2007)","journal-title":"Pervasive Mob. Comput."},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"CA Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 47\u201360. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73538-0_4"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.sysarc.2009.01.003","volume":"55","author":"CA Ardagna","year":"2009","unstructured":"Ardagna, C.A., Cremonini, M., Gianini, G.: Landscapeaware location-privacy protection in location-based services. J. Syst. Architect. 55, 243\u2013254 (2009)","journal-title":"J. Syst. Architect."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201898","author":"M Bellare","year":"1998","unstructured":"Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26\u201345. Springer, Heidelberg (1998). doi:10.1007\/BFb0055718"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptology 21(4), 469\u2013491 (2008)","journal-title":"J. Cryptology"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Privacy Enhancing Technologies","author":"R Cheng","year":"2006","unstructured":"Cheng, R., Zhang, Yu., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393\u2013412. Springer, Heidelberg (2006). doi:10.1007\/11957454_23"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Chow, C.-Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location based services. In: Proceedings of the ACM Symposium on Advances in Geographic Information Systems, pp. 351\u2013380 (2006)","DOI":"10.1145\/1183471.1183500"},{"key":"3_CR8","first-page":"123","volume":"3","author":"ML Damiani","year":"2010","unstructured":"Damiani, M.L., Bertino, E., Silvestri, C.: The probe framework for the personalized cloaking of private locations. Trans. Data Priv. 3, 123\u2013148 (2010)","journal-title":"Trans. Data Priv."},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, Hans -W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 152\u2013170. Springer, Heidelberg (2005). doi:10.1007\/11428572_10"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Fontaine, C. and Galand, F.: A survey of homomorphic encryption for nonspecialists. Eurasip J. Inform. Security, vol. 10.1155\/2007\/13801 (2007)","DOI":"10.1155\/2007\/13801"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-24741-8_6","volume-title":"Advances in Database Technology - EDBT 2004","author":"B Gedik","year":"2004","unstructured":"Gedik, B., Liu, L.: MobiEyes: distributed processing of continuously moving queries on moving objects in a mobile system. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 67\u201387. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24741-8_6"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous Location-based queries in distributed mobile systems. In: Proceedings of World Wide Web Conference (2007) 371\u2013380","DOI":"10.1145\/1242572.1242623"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-73540-3_13","volume-title":"Advances in Spatial and Temporal Databases","author":"G Ghinita","year":"2007","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221\u2013238. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73540-3_13"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Goldwasser, S. and Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: Proceedings of the 14th ACM Symposium on Theory of Computing (STOC 1982), pp. 365\u2013377 (1982)","DOI":"10.1145\/800070.802212"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28, 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Hashem, T., Kulik, L., Zhang, R.: Privacy preserving group nearest neighbor queries. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 489\u2013500 (2010)","DOI":"10.1145\/1739041.1739100"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J.: Non-exposure location anonymity. In: Proceedings of the 25th IEEE International Conference on Data Engineering, pp. 1120\u20131131 (2009)","DOI":"10.1109\/ICDE.2009.106"},{"key":"3_CR19","volume-title":"Modern Cryptography: Theory and Practice","author":"W Mao","year":"2003","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice-Hall PTR, Upper Saddle River (2003)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Mascetti, S., Bettini, C., Wang, X.S., Freni, D., Jajodia, S.: ProvidentHider: An algorithm to preserve historical k-anonymity in LBS. In: Proceedings of the 10th IEEE International Conference on Mobile Data Management, pp. 172\u2013181 (2009)","DOI":"10.1109\/MDM.2009.28"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Mascetti, S., Freni D., Bettini, C., Wang, X., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J., 1\u201326 (2010)","DOI":"10.1007\/s00778-010-0213-7"},{"key":"3_CR22","unstructured":"Mokbel, M.F., Chow, C.-Y., and Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: International Conference on Very Large Data Bases, Seoul, South Korea, pp. 763\u2013774 (2006)"},{"key":"3_CR23","unstructured":"Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2011)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Sen, J.: Homomorphic encryption: theory & application. In: Theory and Practice of Cryptography and Network Security Protocols and Technologies. InTech, pp. 1\u201321 (2013)","DOI":"10.5772\/56687"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Shankar, P., Ganapathy, V., and Iftode, L.: Privately querying location-based services with sybilquery. In Proceedings of the 11th International Conference on Ubiquitous Computing, pp. 31\u201340 (2009)","DOI":"10.1145\/1620545.1620550"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Siksnys, L., Thomsen, J.R., Saltenis, S., Yiu, M.L., Andersen, O.: A location privacy aware friend locator. In: Proceedings of the 11th International Symposium Advanced Spatial Temporal Databases, pp. 405\u2013410 (2009)","DOI":"10.1007\/978-3-642-02982-0_29"},{"key":"3_CR27","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8","volume-title":"Homomorphic Encryption and Applications","author":"X Yi","year":"2014","unstructured":"Yi, X., Paulet, R., Bertino, E.: Homomorphic Encryption and Applications. SCS. Springer, Cham (2014). doi:10.1007\/978-3-319-12229-8"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-75551-7_5","volume-title":"Privacy Enhancing Technologies","author":"G Zhong","year":"2007","unstructured":"Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62\u201376. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-75551-7_5"},{"key":"3_CR29","unstructured":"http:\/\/www.klaasnotfound.com\/2016\/05\/27\/location-on-android-stop-mocking-me. Web, 29 July 2016"},{"key":"3_CR30","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Military_grid_reference_system. Web, 29 July 2016"},{"key":"3_CR31","unstructured":"http:\/\/www.gpsinformation.org\/dale\/nmea.htm. Web, 29 July 2016"},{"key":"3_CR32","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Homomorphic_encryption. Web, 29 July 2016"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Embracing the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59041-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:36:32Z","timestamp":1710354992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59041-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319590400","9783319590417"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59041-7_3","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"5 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCETECH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on E-Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcetech2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mcetech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}