{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:29Z","timestamp":1740099089405,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983844"},{"type":"electronic","value":"9783319983851"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98385-1_6","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:47:49Z","timestamp":1532562469000},"page":"69-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy?"],"prefix":"10.1007","author":[{"given":"Anand","family":"Paturi","sequence":"first","affiliation":[]},{"given":"Subhasish","family":"Mazumdar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-39958-4_2","volume-title":"Web-Age Information Management","author":"N Cui","year":"2016","unstructured":"Cui, N., Yang, X., Wang, B.: A novel spatial cloaking scheme using hierarchical Hilbert Curve for location-based services. In: Cui, B., Zhang, N., Xu, J., Lian, X., Liu, D. (eds.) WAIM 2016. LNCS, vol. 9659, pp. 15\u201327. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-39958-4_2"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Damiani, M.L., Bertino, E., Silvestri, C.: Protecting location privacy against spatial inferences: the probe approach. In: Proceedings $$2nd$$ SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, pp. 32\u201341 (2009)","DOI":"10.1145\/1667502.1667511"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings 16th International Conference on World Wide Web, pp. 371\u2013380 (2007)","DOI":"10.1145\/1242572.1242623"},{"issue":"12","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719\u20131733 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","volume-title":"Advances in Spatial and Temporal Databases","author":"A Khoshgozaran","year":"2007","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239\u2013257. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-73540-3_14"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-03511-1_3","volume-title":"Privacy in Location-Based Applications","author":"A Khoshgozaran","year":"2009","unstructured":"Khoshgozaran, A., Shahabi, C.: Private information retrieval techniques for enabling location privacy in location-based services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 59\u201383. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-03511-1_3"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Lee, H.J., Hong, S.T., Yoon, M., Um, J.H., Chang, J.W.: A new cloaking algorithm using Hilbert curves for privacy protection. In: Proceedings 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp. 42\u201346 (2010)","DOI":"10.1145\/1868470.1868480"},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"Ashwin Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$l$$-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/69.908985","volume":"13","author":"B Moon","year":"2001","unstructured":"Moon, B., Jagadish, H.V., Faloutsos, C., Saltz, J.H.: Analysis of the clustering properties of the Hilbert space-filling curve. IEEE Trans. Knowl. Data Eng. 13(1), 124\u2013141 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Li, H.: A fine-grained spatial cloaking scheme for privacy-aware users in location-based services. In: 2014 23rd International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20138 (2014)","DOI":"10.1109\/ICCCN.2014.6911813"},{"key":"6_CR11","unstructured":"Paturi, A., Mazumdar, S.: Exploring origin and rotation parameters while using Hilbert curves in mobile environments. In: Proceedings International Conference on Mobile Services, Resources, and Users MOBILITY 2018 (2018)"},{"issue":"5","key":"6_CR12","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: $$k$$-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness. Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Knowl.-Based Syst."},{"key":"6_CR13","unstructured":"Yelp, Inc. Category list. Copyright 2004\u20132018. \nhttps:\/\/www.yelp.com\/developers\/documentation\/v3\/category_list"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98385-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:50:37Z","timestamp":1532562637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98385-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983844","9783319983851"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98385-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}