{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:53:11Z","timestamp":1773179591082,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540255215","type":"print"},{"value":"9783540320043","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_19","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"179-192","source":"Crossref","is-referenced-by-count":97,"title":["On the Anonymity of Periodic Location Samples"],"prefix":"10.1007","author":[{"given":"Marco","family":"Gruteser","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Baik","family":"Hoh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Warrior, J., McHenry, E., McGee, K.: They know where you are. IEEE Spectrum (July 2003)","DOI":"10.1109\/MSPEC.2003.1209608"},{"key":"19_CR2","unstructured":"Barkhuus, L., Dey, A.: Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: 9th Internation Conference on Human-Computer Interaction, INTERACT (2003)"},{"issue":"5","key":"19_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty. Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"Fuzziness and Knowledge-based Systems"},{"issue":"5","key":"19_CR4","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"issue":"1","key":"19_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A. Beresford","year":"2003","unstructured":"Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"19_CR7","unstructured":"Vyas, R.: Ford device intended to unclog roads (February 2004), http:\/\/www.freep.com\/money\/autonews\/ford27_20040227.htm"},{"issue":"6","key":"19_CR8","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TAC.1979.1102177","volume":"24","author":"D. Reid","year":"1979","unstructured":"Reid, D.: An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control\u00a024(6), 843\u2013854 (1979)","journal-title":"IEEE Transactions on Automatic Control"},{"key":"19_CR9","unstructured":"Blackman, S., Popoli, R.: Design and Analysis of Modern Tracking Systems. Artech House (1999)"},{"issue":"6","key":"19_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/79.543975","volume":"13","author":"T. Moon","year":"1996","unstructured":"Moon, T.: The expectation-maximization algorithm. IEEE Signal Processing Magazine\u00a013(6), 47\u201360 (1996)","journal-title":"IEEE Signal Processing Magazine"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Beresford, A., Stajano, F.: Mix zones: User privacy in location-aware services. In: IEEE Workshop on Pervasive Computing and Communication Security (PerSec) (2004)","DOI":"10.1109\/PERCOMW.2004.1276918"},{"issue":"1","key":"19_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: 4th International Conference on Ubiquitous Computing (2002)","DOI":"10.1007\/3-540-45809-3_19"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J.-M.: Framework for security and privacy in automotive telematics. In: 2nd ACM International Worksphop on Mobile Commerce (2002)","DOI":"10.1145\/570705.570711"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Lederer, S., Mankoff, J., Dey, A.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: Extended Abstracts of Conference on Human Factors in Computing Systems (CHI), pp. 724\u2013725 (2003)","DOI":"10.1145\/765891.765952"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: 2nd Workshop on Privacy Enhancing Technologies (2002)","DOI":"10.1007\/3-540-36467-6_4"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: 2nd Workshop on Privacy Enhancing Technologies (2002)","DOI":"10.1007\/3-540-36467-6_5"},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/342009.335438","volume-title":"Proc. of the ACM SIGMOD Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of the ACM SIGMOD Conference on Management of Data, pp. 439\u2013450. ACM Press, New York (2000)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:52Z","timestamp":1605760432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}