{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T02:48:43Z","timestamp":1761101323741,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319920122"},{"type":"electronic","value":"9783319920139"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92013-9_2","type":"book-chapter","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T12:57:09Z","timestamp":1526561829000},"page":"15-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Preservation for Trajectory Data Publishing by Look-Up Table Generalization"],"prefix":"10.1007","author":[{"given":"Nattapon","family":"Harnsamut","sequence":"first","affiliation":[]},{"given":"Juggapong","family":"Natwichai","sequence":"additional","affiliation":[]},{"given":"Surapon","family":"Riyana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,18]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Mohammed, N., Fung, B.C.M., Debbabi, M.: Walking in the crowd: anonymizing trajectory data for pattern analysis. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management, pp. 1441\u20131444 (2009)","DOI":"10.1145\/1645953.1646140"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42, 1\u201353 (2010)","journal-title":"ACM Comput. Surv."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1857947.1857950","volume":"4","author":"N Mohammed","year":"2010","unstructured":"Mohammed, N., Fung, B.C.M., Lee, C.K.: Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans. Knowl. Discov. Data 4, 1\u201333 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ins.2011.07.035","volume":"231","author":"R Chen","year":"2013","unstructured":"Chen, R., Fung, B.C., Mohammed, N., Desai, B.C., Wang, K.: Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231, 83\u201397 (2013)","journal-title":"Inf. Sci."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.trc.2013.12.003","volume":"39","author":"M Ghasemzadeh","year":"2014","unstructured":"Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A.: Anonymizing trajectory data for passenger flow analysis. Transp. Res. Part C: Emerg. Technol. 39, 63\u201379 (2014)","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"key":"2_CR6","unstructured":"Bangkok Insurance: Data security policy. http:\/\/www.bangkokinsurance.com\/service\/service_privacy.php (2015)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"O\u2019Halloran, M., Glavin, M.: RFID patient tagging and database system. In: International Conference on Networking, Systems, Mobile Communications and Learning Technologies, p. 162 (2006)","DOI":"10.1109\/ICNICONSMCL.2006.187"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.adhoc.2012.06.015","volume":"11","author":"D Robin","year":"2013","unstructured":"Robin, D., Saravanan, S., Wanlei, Z.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11, 383\u2013396 (2013)","journal-title":"Ad Hoc Netw."},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TIFS.2014.2368363","volume":"10","author":"T Zhu","year":"2015","unstructured":"Zhu, T., Xiong, P., Li, G.K., Zhou, W.: Correlated differential privacy: hiding information in non-IID data set. IEEE Trans. Inf. Forensics Secur. 10, 229\u2013242 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Fung, B., Al-Hussaeni, K., Cao, M.: Preserving RFID data privacy. In: 2009 IEEE International Conference on RFID, pp. 200\u2013207 (2009)","DOI":"10.1109\/RFID.2009.4911184"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Cao, M., Desai, B.C., Xu, H.: Privacy protection for RFID data. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1528\u20131535 (2009)","DOI":"10.1145\/1529282.1529626"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.datak.2014.09.004","volume":"94","author":"K Al-Hussaeni","year":"2014","unstructured":"Al-Hussaeni, K., Fung, B.C., Cheung, W.K.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89\u2013109 (2014)","journal-title":"Data Knowl. Eng."},{"key":"2_CR13","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/978-3-319-65521-5_71","volume-title":"Advances in Network-Based Information Systems","author":"N Harnsamut","year":"2018","unstructured":"Harnsamut, N., Natwichai, J.: Privacy preservation for trajectory data publishing and heuristic approach. In: Barolli, L., Enokido, T., Takizawa, M. (eds.) NBiS 2017. LNDECT, vol. 7, pp. 787\u2013797. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-65521-5_71"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10844-008-0075-2","volume":"33","author":"R Wong","year":"2009","unstructured":"Wong, R., Li, J., Fu, A., Wang, K.: ($$\\alpha $$, K)-anonymous data publishing. J. Intell. Inf. Syst. 33, 209\u2013234 (2009)","journal-title":"J. Intell. Inf. Syst."},{"key":"2_CR15","unstructured":"Mohammed, N., Fung, B.C.M., Debbabi, M.: Preserving privacy and utility in RFID data publishing. Technical report 6850 (2010)"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.knosys.2015.11.007","volume":"94","author":"EG Komishani","year":"2016","unstructured":"Komishani, E.G., Abadi, M., Deldar, F.: PPTD: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl.-Based Syst. 94, 43\u201359 (2016)","journal-title":"Knowl.-Based Syst."},{"key":"2_CR17","unstructured":"Aggarwal, C.C.: On K-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Databases, pp. 901\u2013909 (2005)"}],"container-title":["Lecture Notes in Computer Science","Databases Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92013-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T16:04:38Z","timestamp":1751645078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92013-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319920122","9783319920139"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92013-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}