{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:09:48Z","timestamp":1777493388138,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540720362","type":"print"},{"value":"9783540720379","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72037-9_8","type":"book-chapter","created":{"date-parts":[[2007,6,21]],"date-time":"2007-06-21T14:15:26Z","timestamp":1182435326000},"page":"127-143","source":"Crossref","is-referenced-by-count":316,"title":["Inference Attacks on Location Tracks"],"prefix":"10.1007","author":[{"given":"John","family":"Krumm","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"ACM SIGMOD Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: ACM SIGMOD Conference on Management of Data, Dallas, TX, USA, ACM Press, New York (2000)"},{"issue":"5","key":"8_CR2","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s00779-003-0240-0","volume":"7","author":"D. Ashbrook","year":"2003","unstructured":"Ashbrook, D., Starner, T.: Using GPS to Learn Significant Locations and Predict Movement across Multiple Users. Personal and Ubiquitous Computing\u00a07(5), 275\u2013286 (2003)","journal-title":"Personal and Ubiquitous Computing"},{"key":"8_CR3","unstructured":"Barbaro, M., Zeller Jr., T.: A Face Is Exposed for AOL Searcher No. 4417749. New York Times, New York (2006)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 46\u201355 (2003)","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Consolvo, S., et al.: Location Disclosure to Social Relations: Why, When, & What People Want to Share. In: CHI \u201905: Proceedings of the SIGCHI Conference on Human factors in Computing Systems, New York, NY (2005)","DOI":"10.1145\/1054972.1054985"},{"key":"8_CR6","unstructured":"Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? In: Fourth Workshop on the Economics of Information Security, Harvard University (2005)"},{"key":"8_CR7","volume-title":"Dynamic & Mobile GIS: Investigating Change in Space and Time","author":"M. Duckham","year":"2006","unstructured":"Duckham, M., Kulik, L.: Location Privacy and Location-Aware Computing. In: Drummond, J., et al. (eds.) Dynamic & Mobile GIS: Investigating Change in Space and Time, CRC Press, Boca Raton (2006)"},{"key":"8_CR8","unstructured":"Gendar, A., Lisberg, A.: How Cell Phone Helped Cops Nail Key Murder Suspect. Daily News, New York (2006)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. In: First ACM\/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA, USA (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Location- and Context-Awareness","author":"R. Hariharan","year":"2005","unstructured":"Hariharan, R., Krumm, J., Horvitz, E.: Web-Enhanced GPS. In: Strang, T., Linnhoff-Popien, C. (eds.) LoCA 2005. LNCS, vol.\u00a03479, Springer, Heidelberg (2005)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","first-page":"106","volume-title":"Geographic Information Science","author":"K. Toyama","year":"2004","unstructured":"Toyama, K., Hariharan, R.: Project Lachesis: Parsing and Modeling Location Histories. In: Egenhofer, M.J., Freksa, C., Miller, H.J. (eds.) GIScience 2004. LNCS, vol.\u00a03234, pp. 106\u2013124. Springer, Heidelberg (2004)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","first-page":"159","volume-title":"UbiComp 2005: Ubiquitous Computing","author":"A. LaMarca","year":"2005","unstructured":"LaMarca, A., et al.: Learning and Recognizing the Places We Go. In: Beigl, M., et al. (eds.) UbiComp 2005. LNCS, vol.\u00a03660, pp. 159\u2013176. Springer, Heidelberg (2005)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Hoh, B., et al.: Enhancing Security and Privacy in Traffic-Monitoring Systems. IEEE Pervasive Computing, 38\u201346 (2006)","DOI":"10.1109\/MPRV.2006.69"},{"key":"8_CR14","unstructured":"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyId=C271309B-02DE-42A7-B23E-E19F68667197&displaylang=en"},{"key":"8_CR15","unstructured":"http:\/\/www.openstreetmap.org\/"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","first-page":"213","volume-title":"UbiComp 2005: Ubiquitous Computing","author":"G.D. Abowd","year":"2005","unstructured":"Abowd, G.D., et al.: Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. In: Beigl, M., et al. (eds.) UbiComp 2005. LNCS, vol.\u00a03660, pp. 213\u2013231. Springer, Heidelberg (2005)"},{"issue":"1","key":"8_CR17","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/s00779-002-0214-7","volume":"7","author":"E. Kaasinen","year":"2003","unstructured":"Kaasinen, E.: User Needs for Location-Aware Mobile Services. Personal and Ubiquitous Computing\u00a07(1), 70\u201379 (2003)","journal-title":"Personal and Ubiquitous Computing"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Kang, J.H., et al.: Extracting Places from Traces of Locations. In: 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH\u201904) (2004)","DOI":"10.1145\/1024733.1024748"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11853565_15","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"J. Krumm","year":"2006","unstructured":"Krumm, J., Horvitz, E.: Predestination: Inferring Destinations from Partial Trajectories. In: Dourish, P., Friday, A. (eds.) UbiComp 2006. LNCS, vol.\u00a04206, pp. 243\u2013260. Springer, Heidelberg (2006)"},{"key":"8_CR20","unstructured":"Letchner, J., Krumm, J., Horvitz, E.: Trip Router with Individualized Preferences (TRIP): Incorporating Personalization into Route Planning. In: Eighteenth Conference on Innovative Applications of Artificial Intelligence (IAAI-06), Cambridge, MA, USA (2006)"},{"key":"8_CR21","unstructured":"Liao, L., Fox, D., Kautz, H.A.: Location-Based Activity Recognition using Relational Markov Networks. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI 2005), Edinburgh, Scotland (2005)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Lorkowski, S., et al.: Towards Area-Wide Traffic Monitoring-Applications Derived from Probe Vehicle Data. In: 8th International Conference on Applications of Advanced Technologies in Transportation Engineering, Beijing, China (2004)","DOI":"10.1061\/40730(144)73"},{"key":"8_CR23","unstructured":"Marmasse, N.: Providing Lightweight Telepresence in Mobile Communication to Enhance Collaborative Living. In: Program in Media Arts and Sciences, School of Architecture and Planning, p. 124. MIT, Cambridge, MA, USA (2004)"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","volume-title":"Handheld and Ubiquitous Computing","author":"C. Schmandt","year":"2000","unstructured":"Schmandt, C., Marmasse, N.: Location-Aware Information Delivery with ComMotion. In: Thomas, P., Gellersen, H.-W. (eds.) HUC 2000. LNCS, vol.\u00a01927, Springer, Heidelberg (2000)"},{"key":"8_CR25","unstructured":"Orland, K.: Stalker Victims Should Check For GPS. Associated Press on CBS News (2003), http:\/\/www.cbsnews.com\/stories\/2003\/02\/06\/tech\/main539596.shtml"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","first-page":"433","volume-title":"UbiComp 2004: Ubiquitous Computing","author":"K. Gajos","year":"2004","unstructured":"Gajos, K., et al.: Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, pp. 433\u2013450. Springer, Heidelberg (2004)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, Springer, Heidelberg (2001)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Schilit, B., Hong, J., Gruteser, M.: Wireless Location Privacy Protection. IEEE Computer, 135\u2013137 (2003)","DOI":"10.1109\/MC.2003.1250896"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36578-8_8","volume-title":"Fundamental Approaches to Software Engineering","author":"D. Scott","year":"2003","unstructured":"Scott, D., Beresford, A., Mycroft, A.: Spatial Security Policies for Mobile Agents in a Sentient Computing Environment. In: Pezz\u00e9, M. (ed.) ETAPS 2003 and FASE 2003. LNCS, vol.\u00a02621, Springer, Heidelberg (2003)"},{"key":"8_CR30","unstructured":"Subramanya, A., et al.: Recognizing Activities and Spatial Context Using Wearable Sensors. In: 21st Conference on Uncertainty in Artificial Intelligence (UAI06), Cambridge, MA (2006)"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72037-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:28:45Z","timestamp":1605763725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72037-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720362","9783540720379"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72037-9_8","relation":{},"subject":[]}}