{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:14:13Z","timestamp":1750997653037,"version":"3.41.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678757"},{"type":"electronic","value":"9783319678764"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67876-4_15","type":"book-chapter","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T07:33:43Z","timestamp":1509089623000},"page":"316-337","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Smartphone Users\u2019 Private Locations Through Caching"],"prefix":"10.1007","author":[{"given":"Asma","family":"Patel","sequence":"first","affiliation":[]},{"given":"Esther","family":"Palomar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,28]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Pontes, T., Vasconcelos, M., Almeida, J., Kumaraguru, P., Almeida, V.: We know where you live: privacy characterization of foursquare behavior. In: Proceedings of ACM Conference on Ubiquitous Computing, pp. 898\u2013905. ACM (2012)","key":"15_CR1","DOI":"10.1145\/2370216.2370419"},{"doi-asserted-by":"crossref","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Understanding users\u2019 requirements for data protection in smartphones. In: ICDE Workshop, IEEE International Conference on Secure Data Management on Smartphones and Mobiles, pp. 228\u2013235. IEEE (2012)","key":"15_CR2","DOI":"10.1109\/ICDEW.2012.83"},{"doi-asserted-by":"crossref","unstructured":"Shklovski, I., Mainwaring, S.D., Sk\u00falad\u00f3ttir, H.H., et al.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of ACM Conference on Human factors in computing systems, pp. 2347\u20132356. ACM (2014)","key":"15_CR3","DOI":"10.1145\/2556288.2557421"},{"unstructured":"European Commission: Protection of personal data (2016). http:\/\/ec.europa.eu\/justice\/data-protection\/","key":"15_CR4"},{"unstructured":"IETF: Geographic Location Privacy (2016). http:\/\/datatracker.ietf.org\/wg\/geopriv\/charter\/","key":"15_CR5"},{"key":"15_CR6","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.clsr.2013.03.004","volume":"29","author":"K Michael","year":"2013","unstructured":"Michael, K., Clarke, R.: Location and tracking of mobile devices: \u00dcberveillance stalks the streets. Comput. Law Secur. Rev. 29, 216\u2013228 (2013)","journal-title":"Comput. Law Secur. Rev."},{"doi-asserted-by":"crossref","unstructured":"Almuhimedi, H., Schaub, F., Sadeh, N., Adjerid, I., Acquisti, A., et al.: Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In: Proceedings of ACM Conference on Human Factors in Computing Systems, pp. 787\u2013796. ACM (2015)","key":"15_CR7","DOI":"10.1145\/2702123.2702210"},{"doi-asserted-by":"crossref","unstructured":"Felt, A.P., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: Proceedings of ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 33\u201344. ACM (2012)","key":"15_CR8","DOI":"10.1145\/2381934.2381943"},{"key":"15_CR9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSP.2013.25","volume":"11","author":"LF Cranor","year":"2013","unstructured":"Cranor, L.F., Sadeh, N.: A shortage of privacy engineers. IEEE Secur. Priv. 11, 77\u201379 (2013)","journal-title":"IEEE Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Patel, A., Palomar, E.: LP-Cach\u00e9: Privacy-aware cache model for location-based apps. In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, pp. 183\u2013194, Lisbon, Portugal, 26\u201328 July 2016 (2016)","key":"15_CR10","DOI":"10.5220\/0005970101830194"},{"doi-asserted-by":"crossref","unstructured":"Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., Li, H.: Mobicache: when k-anonymity meets cache. In: GLOBECOM, pp. 820\u2013825. IEEE (2013)","key":"15_CR11","DOI":"10.1109\/GLOCOM.2013.6831174"},{"doi-asserted-by":"crossref","unstructured":"Amini, S., Lindqvist, J., Hong, J., Lin, J., Toch, E., Sadeh, N.: Cach\u00e9: caching location-enhanced content to improve user privacy. In: Proceedings of ACM International Conference on Mobile Systems, Applications, and Services, pp. 197\u2013210. ACM (2011)","key":"15_CR12","DOI":"10.1145\/1999995.2000015"},{"doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Enhancing privacy through caching in location-based services. In: Proceedings of IEEE INFOCOM (2015)","key":"15_CR13","DOI":"10.1109\/INFOCOM.2015.7218474"},{"unstructured":"Google Location Service (2016). https:\/\/support.google.com\/gmm\/answer\/1646140?hl=en-GB","key":"15_CR14"},{"unstructured":"Skyhook (2016). http:\/\/www.skyhookwireless.com\/","key":"15_CR15"},{"unstructured":"Navizon (2016). http:\/\/www.navizon.com","key":"15_CR16"},{"key":"15_CR17","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.pmcj.2015.02.001","volume":"18","author":"Y Zhuang","year":"2015","unstructured":"Zhuang, Y., Syed, Z., Georgy, J., El-Sheimy, N.: Autonomous smartphone-based WiFi positioning system by using access points localization and crowdsourcing. Pervasive Mob. Comput. 18, 118\u2013136 (2015)","journal-title":"Pervasive Mob. Comput."},{"unstructured":"Wireshark (2016). https:\/\/www.wireshark.org","key":"15_CR18"},{"unstructured":"tPacketcapture (2016). http:\/\/play.google.com\/","key":"15_CR19"},{"unstructured":"Android Developer Reference (2016). http:\/\/developer.android.com\/reference\/","key":"15_CR20"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-30921-2_17"},{"unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: detecting privacy leaks in iOS applications. In: NDSS (2011)","key":"15_CR22"},{"key":"15_CR23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. TOCS 32, 5 (2014)","journal-title":"TOCS"},{"doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Rice, A., Skehin, N., Sohan, R.: Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of ACM Workshop on Mobile Computing Systems and Applications, pp. 49\u201354. ACM (2011)","key":"15_CR24","DOI":"10.1145\/2184489.2184500"},{"doi-asserted-by":"crossref","unstructured":"Fawaz, K., Shin, K.G.: Location privacy protection for smartphone users. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, pp. 239\u2013250. ACM (2014)","key":"15_CR25","DOI":"10.1145\/2660267.2660270"},{"doi-asserted-by":"crossref","unstructured":"Patel, A., Palomar, E.: Privacy preservation in location-based mobile applications: research directions. In: Proceedings of IEEE International Conference on Availability, Reliability and Security (ARES), pp. 227\u2013233. IEEE (2014)","key":"15_CR26","DOI":"10.1109\/ARES.2014.37"},{"key":"15_CR27","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s00779-012-0633-z","volume":"18","author":"M Wernke","year":"2014","unstructured":"Wernke, M., Skvortsov, P., D\u00fcrr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18, 163\u2013175 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"15_CR28","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10115-010-0286-z","volume":"26","author":"A Khoshgozaran","year":"2011","unstructured":"Khoshgozaran, A., Shahabi, C., Shirani-Mehr, H.: Location privacy: going beyond K-anonymity, cloaking and anonymizers. Knowl. Inf. Syst. 26, 435\u2013465 (2011)","journal-title":"Knowl. Inf. Syst."},{"key":"15_CR29","first-page":"55","volume":"4","author":"ML Damiani","year":"2011","unstructured":"Damiani, M.L.: Third party geolocation services in LBS: privacy requirements and research issues. Trans. Data Priv. 4, 55\u201372 (2011)","journal-title":"Trans. Data Priv."},{"doi-asserted-by":"crossref","unstructured":"Doty, N., Wilde, E.: Geolocation privacy and application platforms. In: Proceedings of ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp. 65\u201369. ACM (2010)","key":"15_CR30","DOI":"10.1145\/1868470.1868485"},{"unstructured":"Anonymizer (2016). http:\/\/www.anonymizer.com\/","key":"15_CR31"},{"unstructured":"TOR (2016). http:\/\/www.torproject.org\/","key":"15_CR32"},{"key":"15_CR33","volume-title":"Android Programming: Pushing the Limits","author":"E Hellman","year":"2013","unstructured":"Hellman, E.: Android Programming: Pushing the Limits. Wiley, Hoboken (2013)"},{"doi-asserted-by":"crossref","unstructured":"Jeon, J., Micinski, K.K., Vaughan, J.A., Fogel, A., Reddy, N.: Dr. Android and Mr. Hide: fine-grained permissions in android applications. In: Proceedings of ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3\u201314. ACM (2012)","key":"15_CR34","DOI":"10.1145\/2381934.2381938"},{"doi-asserted-by":"crossref","unstructured":"Bell, S., Jung, W.R., Krishnakumar, V.: WiFi-based enhanced positioning systems: accuracy through mapping, calibration, and classification. In: Proceedings of ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness, pp. 3\u20139. ACM (2010)","key":"15_CR35","DOI":"10.1145\/1865885.1865888"},{"unstructured":"Aad, I., Niemi, V.: NRC data collection and the privacy by design principles. In: PhoneSense (2010)","key":"15_CR36"},{"doi-asserted-by":"crossref","unstructured":"Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Position transformation: a location privacy protection method for moving objects. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 62\u201371. ACM (2008)","key":"15_CR37","DOI":"10.1145\/1503402.1503414"},{"unstructured":"WiEye (2016). http:\/\/play.google.com\/store\/apps\/","key":"15_CR38"},{"unstructured":"NetworkInfoIi (2016). http:\/\/play.google.com\/store\/apps\/","key":"15_CR39"},{"doi-asserted-by":"crossref","unstructured":"Kim, D.H., Hightower, J., Govindan, R., Estrin, D.: Discovering semantically meaningful places from pervasive RF-beacons. In: Proceedings of ACM International Conference on Ubiquitous Computing, pp. 21\u201330. ACM (2009)","key":"15_CR40","DOI":"10.1145\/1620545.1620549"},{"unstructured":"Android (2016). http:\/\/developer.android.com\/guide\/topics\/data\/data-storage.html","key":"15_CR41"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67876-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:27:20Z","timestamp":1750966040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67876-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678757","9783319678764"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67876-4_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}