{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:18:45Z","timestamp":1725887925894},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596464"},{"type":"electronic","value":"9783319596471"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59647-1_24","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T22:53:30Z","timestamp":1494629610000},"page":"322-337","source":"Crossref","is-referenced-by-count":0,"title":["A Location Privacy Estimator Based on Spatio-Temporal Location Uncertainties"],"prefix":"10.1007","author":[{"given":"Arielle","family":"Moro","sequence":"first","affiliation":[]},{"given":"Beno\u00eet","family":"Garbinato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"CA Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 47\u201360. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73538-0_4"},{"key":"24_CR2","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1002\/(SICI)1097-0258(19990315)18:5<497::AID-SIM45>3.0.CO;2-#","volume":"18","author":"MP Armstrong","year":"1999","unstructured":"Armstrong, M.P., Rushton, G., Zimmerman, D.L.: Geographically masking health data to preserve confidentiality. Stat. Med. 18, 497\u2013525 (1999)","journal-title":"Stat. Med."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the united states. First Monday 11(9) (2006)","DOI":"10.5210\/fm.v11i9.1394"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 127\u2013131, March 2004","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Privacy Enhancing Technologies","author":"R Cheng","year":"2006","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393\u2013412. Springer, Heidelberg (2006). doi: 10.1007\/11957454_23"},{"issue":"4","key":"24_CR6","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1007\/s10707-014-0205-7","volume":"18","author":"ML Damiani","year":"2014","unstructured":"Damiani, M.L.: Location privacy models in mobile applications: conceptual view and research directions. GeoInformatica 18(4), 819\u2013842 (2014)","journal-title":"GeoInformatica"},{"key":"24_CR7","unstructured":"Duckham, M., Kulik, L.: Location privacy and location-aware computing. In: Dynamic & Mobile GIS: Investigating Change in Space and Time, pp. 34\u201351 (2006)"},{"issue":"2","key":"24_CR8","first-page":"103","volume":"4","author":"S Gambs","year":"2011","unstructured":"Gambs, S., Killijian, M.-O., del Prado, N., Cortez, M.: Show me how you move and i will tell you who you are. Trans. Data Priv. 4(2), 103\u2013126 (2011)","journal-title":"Trans. Data Priv."},{"key":"24_CR9","unstructured":"Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SecureComm, pp. 194\u2013205. IEEE (2005)"},{"issue":"4","key":"24_CR10","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPRV.2006.69","volume":"5","author":"B Hoh","year":"2006","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Comput. 5(4), 38\u201346 (2006)","journal-title":"IEEE Pervasive Comput."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 161\u2013171. ACM, New York (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"24_CR12","unstructured":"Kehr, F., Kowatsch, T., Wentzel, D., Fleisch, E.: Thinking styles and privacy decisions: need for cognition, faith into intuition, and the privacy calculus. In: Smart Enterprise Engineering: 12. Internationale Tagung Wirtschaftsinformatik, WI 2015, Osnabr\u00fcck, Germany, March 4\u20136, 2015, pp. 1071\u20131084 (2015)"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-72037-9_8","volume-title":"Pervasive Computing","author":"J Krumm","year":"2007","unstructured":"Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127\u2013143. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-72037-9_8"},{"issue":"6","key":"24_CR14","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Pers. Ubiquit. Comput. 13(6), 391\u2013399 (2009)","journal-title":"Pers. Ubiquit. Comput."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kulkarni, V., Moro, A., Garbinato, B.: A mobility prediction system leveraging realtime location data streams: poster. In: Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, MobiCom 2016, pp. 430\u2013432. ACM, New York (2016)","DOI":"10.1145\/2973750.2985263"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Laurila, J.K., Gatica-Perez, D., Aad, I., Blom, J., Bornet, O., Do, T.-M.-T., Dousse, O., Eberle, J., Miettinen, M.: The mobile data challenge: big data for mobile computing research. In: Pervasive Computing (2012)","DOI":"10.1016\/j.pmcj.2013.10.001"},{"issue":"2","key":"24_CR17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10207-012-0182-5","volume":"12","author":"D Rebollo-Monedero","year":"2013","unstructured":"Rebollo-Monedero, D., Parra-Arnau, J., D\u00edaz, C., Forn\u00e9, J.: On the measurement of privacy as an attacker\u2019s estimation error. Int. J. Inf. Sec. 12(2), 129\u2013149 (2013)","journal-title":"Int. J. Inf. Sec."},{"key":"24_CR18","unstructured":"Shokri, R., Freudiger, J., Hubaux, J.P.: A unified framework for location privacy. In: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies (PETS 2010), pp. 203\u2013214. Citeseer (2010)"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.-P.: A distortion-based metric for location privacy. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, pp. 21\u201330. ACM (2009)","DOI":"10.1145\/1655188.1655192"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux, J.-P.: Quantifying location privacy. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP 2011, pp. 247\u2013262. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"24_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-26362-5_20","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"H Xu","year":"2015","unstructured":"Xu, H., Wang, H., Stavrou, A.: Privacy risk assessment on online photos. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 427\u2013447. Springer, Cham (2015). doi: 10.1007\/978-3-319-26362-5_20"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59647-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T11:58:23Z","timestamp":1569326303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59647-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596464","9783319596471"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59647-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}