{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:04:32Z","timestamp":1770217472967,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540735397","type":"print"},{"value":"9783540735403","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73540-3_15","type":"book-chapter","created":{"date-parts":[[2007,8,18]],"date-time":"2007-08-18T01:58:05Z","timestamp":1187402285000},"page":"258-275","source":"Crossref","is-referenced-by-count":101,"title":["Enabling Private Continuous Queries for Revealed User Locations"],"prefix":"10.1007","author":[{"given":"Chi-Yin","family":"Chow","sequence":"first","affiliation":[]},{"given":"Mohamed F.","family":"Mokbel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Ackerman, L., Kempf, J., Miki, T.: Wireless Location Privacy: A Report on Law and Policy in the United States, the Europrean Union, and Japan. Technical Report DCL-TR2003-001, DoCoMo Commuinication Laboratories, USA (2003)"},{"key":"15_CR2","unstructured":"Barkhuus, L., Dey, A.K.: Location-Based Services for Mobile Telephony: a Study of Users\u2019 Privacy Concerns. In: Proceedings of the IFIP Conference on Human-Computer Interaction, INTERACT (2003)"},{"issue":"1","key":"15_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":". IEEE Pervasive Computing"},{"issue":"7","key":"15_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSPEC.2003.1209608","volume":"40","author":"J. Warrior","year":"2003","unstructured":"Warrior, J., McHenry, E., McGee, K.: They Know Where You Are. IEEE Spectrum\u00a040(7), 20\u201325 (2003)","journal-title":". IEEE Spectrum"},{"key":"15_CR5","unstructured":"Foxs News: Man Accused of Stalking Ex-Girlfriend With GPS (September 4,\u00a02004), http:\/\/www.foxnews.com\/story\/0,2933,131487,00.html"},{"key":"15_CR6","unstructured":"USAToday: Authorities: GPS System Used to Stalk Woman. (December 30,\u00a02002), http:\/\/usatoday.com\/tech\/news\/2002-12-30-gps-stalker_x.htm"},{"issue":"7","key":"15_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSPEC.2006.1652998","volume":"47","author":"J. Voelcker","year":"2006","unstructured":"Voelcker, J.: Stalked by Satellite: An Alarming Rise in GPS-enabled Harassment. IEEE Spectrum\u00a047(7), 15\u201316 (2006)","journal-title":". IEEE Spectrum"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Proceedings of Privacy Enhancing Technology Workshop (2006)","DOI":"10.1007\/11957454_23"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: ICDCS (2005)","DOI":"10.1109\/ICDCS.2005.48"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: MobiSys (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"2","key":"15_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","volume":"2","author":"M. Gruteser","year":"2004","unstructured":"Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy\u00a02(2), 28\u201334 (2004)","journal-title":". IEEE Security and Privacy"},{"key":"15_CR12","unstructured":"Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: VLDB (2006)"},{"key":"15_CR13","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Anonymity in Location Based Services. Technical Report TRB6\/06, Department of Computer Science, National University of Singapore (2006)"},{"issue":"5","key":"15_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An Architecture for Privacy-Sensitive Ubiquitous Computing. In: MobiSys (2004)","DOI":"10.1145\/990064.990087"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique using Dummies for Location-based Services. In: ICPS (2005)","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"key":"15_CR18","volume-title":"ACM GIS","author":"C.Y. Chow","year":"2006","unstructured":"Chow, C.Y., Mokbel, M.F., Liu, X.: A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In: ACM GIS, ACM Press, ACM GIS (2006)"},{"key":"15_CR19","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIV\u00c9: Anonymous Location-Based Queries in Distributed Mobile Systems. In: WWW (to appear, 2007)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Mokbel, M.F., Chow, C.-Y.: Challenges in Preserving Location Privacy in Peer-to-Peer Environments (Invited paper). In: Proceedings of the International Workshop on Information Processing over Evolving Networks, WINPEN. (2006)","DOI":"10.1109\/WAIMW.2006.8"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The New Casper: A Privacy-Aware Location-based Databse Server (Demonstration). In: ICDE (2007)","DOI":"10.1109\/ICDE.2007.369052"},{"issue":"2","key":"15_CR22","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T. Brinkhoff","year":"2002","unstructured":"Brinkhoff, T.: A Framework for Generating Network-Based Moving Objects. GeoInformatica\u00a06(2), 153\u2013180 (2002)","journal-title":". GeoInformatica"}],"container-title":["Lecture Notes in Computer Science","Advances in Spatial and Temporal Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73540-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:17:29Z","timestamp":1619518649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73540-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735397","9783540735403"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73540-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}