{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:24:53Z","timestamp":1775258693838,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319981604","type":"print"},{"value":"9783319981611","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98161-1_14","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T15:59:02Z","timestamp":1540569542000},"page":"373-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Location Privacy-Preserving Applications and Services"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Boutsis","sequence":"first","affiliation":[]},{"given":"Vana","family":"Kalogeraki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"14_CR1","first-page":"1","volume":"52","author":"P K Agarwal","year":"2005","unstructured":"P. K. Agarwal, S. Har-Peled, and K. R. Varadarajan. Geometric approximation via coresets. Combinatorial and computational geometry, 52:1\u201330, 2005.","journal-title":"Combinatorial and computational geometry"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD, Dallas, Texas, United States, May 2000.","DOI":"10.1145\/342009.335438"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.pmcj.2014.09.010","volume":"17","author":"C Bettini","year":"2015","unstructured":"C. Bettini and D. Riboni. Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing, 17:159\u2013174, 2015.","journal-title":"Pervasive and Mobile Computing"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"I. Boutsis and V. Kalogeraki. Crowdalert: a mobile app for event reporting and user alerting in real-time. In UbiComp, Heidelberg, Germany, 2016.","DOI":"10.1145\/2968219.2971385"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"I. Boutsis and V. Kalogeraki. Location privacy for crowdsourcing applications. In UbiComp, Heidelberg, Germany, 2016.","DOI":"10.1145\/2971648.2971741"},{"issue":"4","key":"14_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"Chi-Yin Chow","year":"2009","unstructured":"C.-Y. Chow, M. F. Mokbel, and W. G. Aref. Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems (TODS), 34(4):24, 2009.","journal-title":"ACM Transactions on Database Systems"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3, 2013.","DOI":"10.1038\/srep01376"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"K. Dong, T. Gu, X. Tao, and J. Lu. Complete bipartite anonymity: Confusing anonymous mobility traces for location privacy. In ICPADS, pages 205\u2013212, Singapore, December 2014.","DOI":"10.1109\/ICPADS.2012.37"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"K. Fawaz and K. G. Shin. Location privacy protection for smartphone users. In CCS, pages 239\u2013250, Scottsdale, Arizona,, november 2014.","DOI":"10.1145\/2660267.2660270"},{"issue":"8","key":"14_CR10","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.jcss.2014.04.024","volume":"80","author":"S\u00e9bastien Gambs","year":"2014","unstructured":"S. Gambs, M.-O. Killijian, and M. N\u00fa\u00f1ez del Prado Cortez. De-anonymization attack on geolocated data. Journal of Computer and System Sciences, 80(8):1597\u20131614, 2014.","journal-title":"Journal of Computer and System Sciences"},{"issue":"6","key":"14_CR11","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TIFS.2013.2252618","volume":"8","author":"S Gao","year":"2013","unstructured":"S. Gao, J. Ma, W. Shi, G. Zhan, and C. Sun. Trpf: A trajectory privacy-preserving framework for participatory sensing. Information Forensics and Security, IEEE Transactions on, 8(6):874\u2013887, 2013.","journal-title":"Information Forensics and Security, IEEE Transactions on"},{"issue":"1","key":"14_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1412734.1412739","volume":"10","author":"A Gkoulalas-Divanis","year":"2008","unstructured":"A. Gkoulalas-Divanis and V. S. Verykios. A privacy-aware trajectory tracking query engine. SIGKDD Explorations Newsletter, 10(1):40\u201349, May 2008.","journal-title":"SIGKDD Explorations Newsletter"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"T. Higuchi, P. Martin, S. Chakraborty, and M. Srivastava. AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems. In UbiComp, pages 1119\u20131130, Osaka, Japan, Sep 2015.","DOI":"10.1145\/2750858.2805827"},{"key":"14_CR14","unstructured":"B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, Athens, Greece, September 2005."},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"C.-C. Hung, W.-C. Peng, and W.-C. Lee. Clustering and aggregating clues of trajectories for mining trajectory patterns and routes. The VLDB Journal, pages 1\u201324, 2011.","DOI":"10.1007\/s00778-011-0262-6"},{"key":"14_CR16","first-page":"280","volume-title":"Lecture Notes in Computer Science","author":"Apu Kapadia","year":"2008","unstructured":"A. Kapadia, N. Triandopoulos, C. Cornelius, D. Peebles, and D. Kotz. Anonysense: Opportunistic and privacy-preserving context collection. In Pervasive Computing, pages 280\u2013297. Sydney, Australia, May 2008."},{"issue":"2","key":"14_CR17","first-page":"131","volume":"7","author":"S Mascetti","year":"2014","unstructured":"S. Mascetti, L. Bertolaja, and C. Bettini. Safebox: adaptable spatio-temporal generalization for location privacy protection. Transactions on Data Privacy, 7(2):131\u2013163, 2014.","journal-title":"Transactions on Data Privacy"},{"issue":"4","key":"14_CR18","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s00778-010-0213-7","volume":"20","author":"S Mascetti","year":"2011","unstructured":"S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. The VLDB Journal, 20(4):541\u2013566, 2011.","journal-title":"The VLDB Journal"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li. Achieving k-anonymity in privacy-aware location-based services. In INFOCOM, pages 754\u2013762, Toronto, CA, April 2014.","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"N. Pelekis, A. Gkoulalas-Divanis, M. Vodas, D. Kopanaki, and Y. Theodoridis. Privacy-aware querying over sensitive trajectory data. In CIKM, Glasgow, Scotland, October 2011.","DOI":"10.1145\/2063576.2063706"},{"issue":"6","key":"14_CR21","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2009","unstructured":"N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6):401\u2013412, 2009.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"C E Shannon","year":"2001","unstructured":"C. E. Shannon. A mathematical theory of communication. SIGMOBILE Mob. Comput. Commun. Rev., 5(1):3\u201355, 2001.","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"J. Shao, R. Lu, and X. Lin. Fine: A fine-grained privacy-preserving location-based service framework for mobile devices. In INFOCOM, pages 244\u2013252, Toronto, CA, April 2014.","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"M. Terrovitis and N. Mamoulis. Privacy preservation in the publication of trajectories. In MDM, Beijing, China, April 2008.","DOI":"10.1109\/MDM.2008.29"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"I. J. Vergara-Laurens, D. Mendez, and M. A. Labrador. Privacy, quality of information, and energy consumption in participatory sensing systems. In PerCom, pages 199\u2013207, Budapest, Hungary, March 2014.","DOI":"10.1109\/PerCom.2014.6813961"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"S. Wilson, J. Cranshaw, N. Sadeh, A. Acquisti, L. F. Cranor, J. Springfield, S. Y. Jeong, and A. Balasubramanian. Privacy manipulation and acclimation in a location sharing application. In UbiComp, pages 549\u2013558, Zurich, CH, September 2013.","DOI":"10.1145\/2493432.2493436"}],"container-title":["Handbook of Mobile Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98161-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:03:04Z","timestamp":1775253784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98161-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319981604","9783319981611"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98161-1_14","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}