{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:30:06Z","timestamp":1725550206070},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642120893"},{"type":"electronic","value":"9783642120909"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12090-9_12","type":"book-chapter","created":{"date-parts":[[2010,3,15]],"date-time":"2010-03-15T14:44:21Z","timestamp":1268664261000},"page":"133-144","source":"Crossref","is-referenced-by-count":8,"title":["An Adaptive Grid-Based Approach to Location Privacy Preservation"],"prefix":"10.1007","author":[{"given":"Anh Tuan","family":"Truong","sequence":"first","affiliation":[]},{"given":"Quynh Chi","family":"Truong","sequence":"additional","affiliation":[]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Truong, Q.C., Truong, T.A., Dang, T.K.: Privacy Preserving through A Memorizing Algorithm in Location-Based Services. In: 7th International Conference on Advances in Mobile Computing & Multimedia (2009)","DOI":"10.1145\/1821748.1821780"},{"key":"12_CR2","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/978-0-387-48533-1_22","volume-title":"Handbook of Database Security \u2013 Applications and Trends","author":"C.A. Ardagna","year":"2008","unstructured":"Ardagna, C.A., Cremonini, M., Vimercati, S.D.C., Samarati, P.: Privacy-enhanced Location-based Access Control. In: Michael, G., Sushil, J. (eds.) Handbook of Database Security \u2013 Applications and Trends, pp. 531\u2013552. Springer, Heidelberg (2008)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing, 46\u201355 (2003)","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (2004)","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bettini, C., Wang, X., Jajodia, S.: Protecting privacy against location-based personal identification. In: 2nd VLDB Workshop on Secure Data Management (2005)","DOI":"10.1007\/11552338_13"},{"key":"12_CR6","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/978-0-387-48533-1_21","volume-title":"Handbook of Database Security \u2013 Applications and Trends","author":"C. Bettini","year":"2008","unstructured":"Bettini, C., Mascetti, S., Wang, X.S.: Privacy Protection through Anonymity in Location-based Services. In: Michael, G., Sushil, J. (eds.) Handbook of Database Security \u2013 Applications and Trends, pp. 509\u2013530. Springer, Heidelberg (2008)"},{"key":"12_CR7","unstructured":"Bugra, G., Ling, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transaction on mobile computing (2008)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/0-306-47573-1_8","volume-title":"Geographic Location in the Internet","author":"J.R. Cuellar","year":"2002","unstructured":"Cuellar, J.R.: Location Information Privacy. In: Srikaya, B. (ed.) Geographic Location in the Internet, pp. 179\u2013208. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Gid\u00f3falvi, G., Huang, X., Pedersen, T.B.: Privacy-Preserving Data Mining on Moving Object Trajectories. In: 8th International Conference on Mobile Data Management (2007)","DOI":"10.1109\/MDM.2007.18"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: 1st International Conference on Mobile Systems, Applications, and Services (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"12_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/0470092335","volume-title":"Location-based Services - Fundamentals and Operation","author":"A. Kupper","year":"2005","unstructured":"Kupper, A.: Location-based Services - Fundamentals and Operation. John Wiley & Sons, Chichester (2005)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: 4th International Conference on Ubiquitous Computing, pp. 237\u2013245 (2002)","DOI":"10.1007\/3-540-45809-3_19"},{"key":"12_CR13","volume-title":"Protecting Privacy in Continuous Location - Tracking Applications","author":"G. Marco","year":"2004","unstructured":"Marco, G., Xuan, L.: Protecting Privacy in Continuous Location - Tracking Applications. IEEE Computer Society, Los Alamitos (2004)"},{"key":"12_CR14","unstructured":"Mohamed, F.M.: Privacy in Location-based Services: State-of-the-art and Research Directions. In: IEEE International Conference on Mobile Data Management (2007)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing, 56\u201364 (2003)","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"12_CR16","unstructured":"Panos, K., Gabriel, G., Kyriakos, M., Dimitris, P.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering (2007)"}],"container-title":["Studies in Computational Intelligence","Advances in Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12090-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:47:36Z","timestamp":1606186056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12090-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642120893","9783642120909"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12090-9_12","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2010]]}}}