{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T04:24:17Z","timestamp":1765772657670,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":53,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035104"},{"type":"electronic","value":"9783642035111"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03511-1_7","type":"book-chapter","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T07:23:44Z","timestamp":1248938624000},"page":"151-172","source":"Crossref","is-referenced-by-count":20,"title":["Privacy in Georeferenced Context-Aware Services: A Survey"],"prefix":"10.1007","author":[{"given":"Daniele","family":"Riboni","sequence":"first","affiliation":[]},{"given":"Linda","family":"Pareschi","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"129","volume-title":"Proceedings of the 2003 Conference on Human Factors in Computing Systems (CHI 2003)","author":"L. Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems (CHI 2003), pp. 129\u2013136. ACM Press, New York (2003)"},{"issue":"6","key":"7_CR2","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S. Lederer","year":"2004","unstructured":"Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing\u00a08(6), 440\u2013454 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"doi-asserted-by":"crossref","unstructured":"Bettini, C., Mascetti, S., Wang, X.S.: Privacy Protection through Anonymity in Location-based Services. In: Handbook of Database Security: Applications and Trends, pp. 509\u2013530 (2008)","key":"7_CR3","DOI":"10.1007\/978-0-387-48533-1_21"},{"issue":"6","key":"7_CR4","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1016\/j.pmcj.2008.04.008","volume":"4","author":"D. Riboni","year":"2008","unstructured":"Riboni, D., Pareschi, L., Bettini, C.: Shadow attacks on users\u2019 anonymity in pervasive computing environments. Pervasive and Mobile Computing\u00a04(6), 819\u2013835 (2008)","journal-title":"Pervasive and Mobile Computing"},{"key":"7_CR5","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/PERSER.2004.1356755","volume-title":"ICPS 2004: Proceedings of the The IEEE\/ACS International Conference on Pervasive Services","author":"M.J. Atallah","year":"2004","unstructured":"Atallah, M.J., Frikken, K.B.: Privacy-Preserving Location-Dependent Query Processing. In: ICPS 2004: Proceedings of the The IEEE\/ACS International Conference on Pervasive Services, pp. 9\u201317. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1376616.1376631","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2008)","author":"G. Ghinita","year":"2008","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD 2008), pp. 121\u2013132. ACM Press, New York (2008)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2007)","author":"C.A. Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 47\u201360. Springer, Heidelberg (2007)"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/ICDE.2008.4497445","volume-title":"Proceedings of the 24th International Conference on Data Engineering (ICDE 2008)","author":"M.L. Yiu","year":"2008","unstructured":"Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: Proceedings of the 24th International Conference on Data Engineering (ICDE 2008), pp. 366\u2013375. IEEE Computer Society Press, Los Alamitos (2008)"},{"doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 31\u201342. USENIX Association (2003)","key":"7_CR9","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B. Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing\u00a07(1), 1\u201318 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"7_CR11","first-page":"901","volume-title":"Proceedings of the 31st International Conference on Very Large Data Bases (VLDB)","author":"C.C. Aggarwal","year":"2005","unstructured":"Aggarwal, C.C.: On k-Anonymity and the Curse of Dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), pp. 901\u2013909. ACM Press, New York (2005)"},{"issue":"9","key":"7_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B. Neuman","year":"1994","unstructured":"Neuman, B., Ts\u2019o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine\u00a032(9), 33\u201338 (1994)","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Rubin, A.D.: Anonymous web transactions with crowds. Commun. ACM\u00a042(2), 32\u201348 (1999)","journal-title":"Commun. ACM"},{"key":"7_CR15","first-page":"193","volume-title":"CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security","author":"M.J. Freedman","year":"2002","unstructured":"Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 193\u2013206. ACM Press, New York (2002)"},{"doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: SSYM 2004: Proceedings of the 13th conference on USENIX Security Symposium, p. 21. USENIX Association (2004)","key":"7_CR16","DOI":"10.21236\/ADA465464"},{"issue":"2","key":"7_CR17","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM\u00a042(2), 39\u201341 (1999)","journal-title":"Commun. ACM"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/ICDCS.2002.1022244","volume-title":"Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS 2002)","author":"J. Al-Muhtadi","year":"2002","unstructured":"Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, M.D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS 2002), p. 74. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-44634-6_16","volume-title":"Algorithms and Data Structures","author":"M.J. Atallah","year":"2001","unstructured":"Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol.\u00a02125, pp. 165\u2013179. Springer, Heidelberg (2001)"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000, vol.\u00a02171, pp. 137\u2013196. Springer, Heidelberg (2001)"},{"issue":"3","key":"7_CR21","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/567331.567336","volume":"36","author":"A. Kumar","year":"2002","unstructured":"Kumar, A., Karnik, N.M., Chafle, G.: Context sensitivity in role-based access control. Operating Systems Review\u00a036(3), 53\u201366 (2002)","journal-title":"Operating Systems Review"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/CSAC.2002.1176296","volume-title":"Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002)","author":"M.J. Covington","year":"2002","unstructured":"Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 249\u2013260. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/POLICY.2007.40","volume-title":"Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks(POLICY 2007)","author":"A. Toninelli","year":"2007","unstructured":"Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: Proteus: A Semantic Context-Aware Adaptive Policy Model. In: Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks(POLICY 2007), pp. 129\u2013140. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"9","key":"7_CR24","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R. Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, P.: Access Control: Principles and Practice. IEEE Communications\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communications"},{"issue":"2","key":"7_CR25","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"3","key":"7_CR26","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.pmcj.2006.07.007","volume":"2","author":"U. Hengartner","year":"2006","unstructured":"Hengartner, U., Steenkiste, P.: Avoiding Privacy Violations Caused by Context-Sensitive Services. Pervasive and Mobile Computing\u00a02(3), 427\u2013452 (2006)","journal-title":"Pervasive and Mobile Computing"},{"issue":"1","key":"7_CR27","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing\u00a018(1), 186\u2013208 (1989)","journal-title":"SIAM Journal of Computing"},{"doi-asserted-by":"crossref","unstructured":"Wang, C.D., Feng, L.C., Wang, Q.: Zero-Knowledge-Based User Authentication Technique in Context-aware System. In: International Conference on Multimedia and Ubiquitous Engineering, 2007. MUE 2007, pp. 874\u2013879 (2007)","key":"7_CR28","DOI":"10.1109\/MUE.2007.221"},{"issue":"4","key":"7_CR29","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1145\/1108906.1108910","volume":"8","author":"U. Hengartner","year":"2005","unstructured":"Hengartner, U., Steenkiste, P.: Access control to people location information. ACM Trans. Inf. Syst. Secur.\u00a08(4), 424\u2013456 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"unstructured":"Schulzrinne, H., Tschofenig, H., Morris, J., Cuellar, J., Polk, J.: Geolocation policy: A document format for expressing privacy preferences for location information (January 2009), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-geopriv-policy-18.txt","key":"7_CR30"},{"key":"7_CR31","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/MDM.2004.1263065","volume-title":"Proceedings of the 2004 IEEE International Conference on Mobile Data Management (MDM 2004)","author":"R. Hull","year":"2004","unstructured":"Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, P., Sahuguet, A., Varadarajan, S., Vyas, A.: Enabling Context-Aware and Privacy-Conscious User Data Sharing. In: Proceedings of the 2004 IEEE International Conference on Mobile Data Management (MDM 2004), pp. 187\u2013198. IEEE Computer Society, Los Alamitos (2004)"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-73538-0_5","volume-title":"Data and Applications Security XXI","author":"V. Atluri","year":"2007","unstructured":"Atluri, V., Shin, H.: Efficient Security Policy Enforcement in a Location Based Service Environment. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 61\u201376. Springer, Heidelberg (2007)"},{"issue":"1\u20132","key":"7_CR33","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1504\/IJICS.2007.012247","volume":"1","author":"V. Atluri","year":"2007","unstructured":"Atluri, V., Chun, S.A.: A geotemporal role-based authorisation system. International Journal of Information and Computer Security\u00a01(1\u20132), 143\u2013168 (2007)","journal-title":"International Journal of Information and Computer Security"},{"key":"7_CR34","first-page":"253","volume-title":"Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004)","author":"A. Corradi","year":"2004","unstructured":"Corradi, A., Montanari, R., Tibaldi, D.: Context-Based Access Control Management in Ubiquitous Environments. In: Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp. 253\u2013260. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"7_CR35","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/SECURECOMM.2005.8","volume-title":"Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005)","author":"V. Sacramento","year":"2005","unstructured":"Sacramento, V., Endler, M., Nascimento, F.N.: A Privacy Service for Context-aware Mobile Computing. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 182\u2013193. IEEE Computer Society, Los Alamitos (2005)"},{"key":"7_CR36","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/ICCCN.2007.4318009","volume-title":"Proceedings of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007)","author":"Q. Zhang","year":"2007","unstructured":"Zhang, Q., Qi, Y., Zhao, J., Hou, D., Zhao, T., Liu, L.: A Study on Context-aware Privacy Protection for Personal Information. In: Proceedings of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007), pp. 1351\u20131358. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"6","key":"7_CR37","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2004.97","volume":"2","author":"D.E. Bakken","year":"2004","unstructured":"Bakken, D.E., Parameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data Obfuscation: Anonymity and Desensitization of Usable Data Sets. IEEE Security & Privacy\u00a02(6), 34\u201341 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"7_CR38","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1142473.1142500","volume-title":"SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data","author":"X. Xiao","year":"2006","unstructured":"Xiao, X., Tao, Y.: Personalized privacy preservation. In: SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 229\u2013240. ACM Press, New York (2006)"},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"issue":"3","key":"7_CR40","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.websem.2003.07.008","volume":"1","author":"F.L. Gandon","year":"2004","unstructured":"Gandon, F.L., Sadeh, N.M.: Semantic web technologies to reconcile privacy and context awareness. J. Web Sem.\u00a01(3), 241\u2013260 (2004)","journal-title":"J. Web Sem."},{"key":"7_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1007\/978-3-540-73549-6_91","volume-title":"Ubiquitous Intelligence and Computing","author":"R. Wishart","year":"2007","unstructured":"Wishart, R., Henricksen, K., Indulska, J.: Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol.\u00a04611, pp. 929\u2013940. Springer, Heidelberg (2007)"},{"issue":"3","key":"7_CR42","doi-asserted-by":"publisher","first-page":"83","DOI":"10.4304\/jsw.3.3.83-93","volume":"3","author":"K. Sheikh","year":"2008","unstructured":"Sheikh, K., Wegdam, M., van Sinderen, M.: Quality-of-Context and its use for Protecting Privacy in Context Aware Systems. Journal of Software\u00a03(3), 83\u201393 (2008)","journal-title":"Journal of Software"},{"issue":"6","key":"7_CR43","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting Respondents\u2019 Identities in Microdata Release. IEEE Trans. on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"7_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Shin, H., Atluri, V., Vaidya, J.: A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. In: Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), pp. 73\u201380 (2008)","key":"7_CR45","DOI":"10.1109\/MDM.2008.33"},{"doi-asserted-by":"crossref","unstructured":"Hore, B., Wickramasuriya, J., Mehrotra, S., Venkatasubramanian, N., Massaguer, D.: Privacy-Preserving Event Detection in Pervasive Spaces. In: Proceedings of the 7th IEEE International Conference on Pervasive Computing and Communications (PerCom 2009) (2009)","key":"7_CR46","DOI":"10.1109\/PERCOM.2009.4912772"},{"key":"7_CR47","volume-title":"Proceedings of ICDE 2006","author":"A. Machanavajjhala","year":"2006","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of ICDE 2006. IEEE Computer Society, Los Alamitos (2006)"},{"doi-asserted-by":"crossref","unstructured":"Riboni, D., Pareschi, L., Bettini, C., Jajodia, S.: Preserving Anonymity of Recurrent Location-based Queries. In: Proceedings of the 16th International Symposium on Temporal Representation and Reasoning (TIME 2009) (to appear, 2009)","key":"7_CR48","DOI":"10.1109\/TIME.2009.8"},{"key":"7_CR49","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/PERCOM.2008.47","volume-title":"Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Proceedings of the Workshops","author":"L. Pareschi","year":"2008","unstructured":"Pareschi, L., Riboni, D., Agostini, A., Bettini, C.: Composition and Generalization of Context Data for Privacy Preservation. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Proceedings of the Workshops, pp. 429\u2013433. IEEE Computer Society, Los Alamitos (2008)"},{"key":"7_CR50","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/ICONS.2008.46","volume-title":"Proceedings of the Third International Conference on Systems (ICONS 2008)","author":"E. Papadopoulou","year":"2008","unstructured":"Papadopoulou, E., McBurney, S., Taylor, N., Williams, M.H., Dolinar, K., Neubauer, M.: Using User Preferences to Enhance Privacy in Pervasive Systems. In: Proceedings of the Third International Conference on Systems (ICONS 2008), pp. 271\u2013276. IEEE Computer Society, Los Alamitos (2008)"},{"key":"7_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-540-79576-6_17","volume-title":"Pervasive Computing","author":"A. Kapadia","year":"2008","unstructured":"Kapadia, A., Triandopoulos, N., Cornelius, C., Peebles, D., Kotz, D.: AnonySense: Opportunistic and Privacy-Preserving Context Collection. In: Indulska, J., Patterson, D.J., Rodden, T., Ott, M. (eds.) Pervasive 2008. LNCS, vol.\u00a05013, pp. 280\u2013297. Springer, Heidelberg (2008)"},{"key":"7_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"7_CR53","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1134760.1134773","volume-title":"Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 2006)","author":"D. Simon","year":"2006","unstructured":"Simon, D., Cifuentes, C., Cleal, D., Daniels, J., White, D.: Java $^{\\mbox{\\tiny TM}}$ on the bare metal of wireless sensor devices: the squawk Java virtual machine. In: Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE 2006), pp. 78\u201388. ACM Press, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Location-Based Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03511-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T15:18:39Z","timestamp":1739287119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03511-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035104","9783642035111"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03511-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}