{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:58:42Z","timestamp":1743015522148,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_23","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"325-339","source":"Crossref","is-referenced-by-count":7,"title":["Time Warp: How Time Affects Privacy in LBSs"],"prefix":"10.1007","author":[{"given":"Luciana","family":"Marconi","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"23_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/11552338_13","volume-title":"Secure Data Management","author":"C. Bettini","year":"2005","unstructured":"Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2005. LNCS, vol.\u00a03674, pp. 185\u2013199. Springer, Heidelberg (2005)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Chow, C., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: GIS 2006, pp. 171\u2013178 (2006)","DOI":"10.1145\/1183471.1183500"},{"key":"23_CR4","unstructured":"Damiani, M.L., Bertino, E., Silvestri, C.: The probe framework for the personalized cloaking of private locations. Transactions on Data Privacy, 123\u2013148 (2010)"},{"issue":"2","key":"23_CR5","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1002\/sec.93","volume":"2","author":"R. Di Pietro","year":"2009","unstructured":"Di Pietro, R., Michiardi, P., Molva, R.: Confidentiality and integrity for data aggregation in wsn using peer monitoring. Security and Communication Networks\u00a02(2), 181\u2013194 (2009)","journal-title":"Security and Communication Networks"},{"key":"23_CR6","unstructured":"Di Pietro, R., Viejo, A.: Location privacy and resilience in wireless sensor networks querying. Computer Communications (to appear)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Manshaei, M.H., Hubaux, J., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: CCS 2009, pp. 324\u2013337 (2009)","DOI":"10.1145\/1653662.1653702"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Manshaei, M.H., Le Boudec, J., Hubaux, J.: On the Age of Pseudonyms in Mobile Ad Hoc Networks. In: INFOCOMM 2010, pp. 1577\u20131585 (2010)","DOI":"10.1109\/INFCOM.2010.5461975"},{"key":"23_CR9","unstructured":"Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.: Mix-zones for location privacy in vehicular networks. In: Win-ITS 2007 (2007)"},{"key":"23_CR10","unstructured":"Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS 2005, pp. 620\u2013629 (2005)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD 2008, pp. 121\u2013132 (2008)","DOI":"10.1145\/1376616.1376631"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"2","key":"23_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","volume":"2","author":"M. Gruteser","year":"2004","unstructured":"Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security and Privacy\u00a02(2), 28\u201334 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"23_CR14","unstructured":"Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM 2005, pp. 194\u2013205 (2005)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: CCS 2007, pp. 161\u2013171 (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005, pp. 88\u201397 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"issue":"6","key":"23_CR17","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J. Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput.\u00a013(6), 391\u2013399 (2009)","journal-title":"Personal Ubiquitous Comput."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: SIGMOD 2005, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"23_CR19","unstructured":"Mokbel, M.F., Chow, C., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: VLDB 2006, pp. 763\u2013774 (2006)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Ortolani, S., Conti, M., Crispo, B., Di Pietro, R.: Event Handoff Unobservability in WSN. In: iNetSec (2010)","DOI":"10.1007\/978-3-642-19228-9_3"},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/11861386_2","volume-title":"Security Protocols","author":"A. Pashalidis","year":"2006","unstructured":"Pashalidis, A., Mitchell, C.J.: Limits to anonymity when using credentials. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol.\u00a03957, pp. 4\u201312. Springer, Heidelberg (2006)"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"23_CR23","unstructured":"Shokri, R., Freudiger, J., Hubaux, J.: Unified framework for location privacy. In: PETS 2010, pp. 203\u2013214 (2010)"},{"key":"23_CR24","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-88269-5_19","volume-title":"Modeling Decisions for Artificial Intelligence","author":"A. Solanas","year":"2008","unstructured":"Solanas, A., Di Pietro, R.: A linear-time multivariate micro-aggregation for privacy protection in uniform very large data sets. In: Torra, V., Narukawa, Y. (eds.) MDAI 2008. LNCS (LNAI), vol.\u00a05285, pp. 203\u2013214. Springer, Heidelberg (2008)"},{"issue":"10","key":"23_CR25","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"5","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-Based Systems\u00a05(10), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty Fuzziness and Knowledge-Based Systems"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Location anonymity in continuous location-based services. In: GIS 2007, pp. 1\u20138 (2007)","DOI":"10.1145\/1341012.1341062"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Exploring historical location data for anonimity preservation in location-based services. In: INFOCOM 2008, pp. 547\u2013555 (2008)","DOI":"10.1109\/INFOCOM.2008.103"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Xu, T., Cai, Y.: Feeling-based location privacy protection for location-based services. In: CCS 2009, pp. 348\u2013357 (2009)","DOI":"10.1109\/CIT.2009.28"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:18:01Z","timestamp":1566764281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}