{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:13:24Z","timestamp":1761988404561,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642222627"},{"type":"electronic","value":"9783642222634"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22263-4_4","type":"book-chapter","created":{"date-parts":[[2011,7,18]],"date-time":"2011-07-18T17:34:45Z","timestamp":1311010485000},"page":"57-76","source":"Crossref","is-referenced-by-count":58,"title":["Quantifying Location Privacy: The Case of Sporadic Location Exposure"],"prefix":"10.1007","author":[{"given":"Reza","family":"Shokri","sequence":"first","affiliation":[]},{"given":"George","family":"Theodorakopoulos","sequence":"additional","affiliation":[]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[]},{"given":"Jean-Yves","family":"Le Boudec","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Location-Privacy Meter tool, (2011), \n                  \n                    http:\/\/people.epfl.ch\/reza.shokri"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1456403.1456409","volume-title":"WPES 2008: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society","author":"Y. Mulder De","year":"2008","unstructured":"De Mulder, Y., Danezis, G., Batina, L., Preneel, B.: Identification via location-profiling in gsm networks. In: WPES 2008: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 23\u201332. ACM Press, New York (2008)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, Springer, Heidelberg (2005)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Shokri, R., Hubaux, J.-P.: Evaluating the privacy risk of location-based services. In: Financial Cryptography and Data Security, FC (2011)","DOI":"10.1007\/978-3-642-27576-0_3"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B. Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing\u00a07(1), 1\u201318 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"4_CR7","first-page":"390","volume-title":"Pervasive 2009: Proceedings of the 7th International Conference on Pervasive Computing","author":"P. Golle","year":"2009","unstructured":"Golle, P., Partridge, K.: On the anonymity of home\/work location pairs. In: Pervasive 2009: Proceedings of the 7th International Conference on Pervasive Computing, pp. 390\u2013397. Springer, Berlin (2009)"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31\u201342. ACM Press, New York (2003)"},{"key":"4_CR9","first-page":"194","volume-title":"SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks","author":"B. Hoh","year":"2005","unstructured":"Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: SECURECOMM 2005: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 194\u2013205. IEEE Computer Society Press, Washington (2005)"},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MPRV.2006.69","volume":"5","author":"B. Hoh","year":"2006","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing\u00a05(4), 38\u201346 (2006)","journal-title":"IEEE Pervasive Computing"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/1315245.1315266","volume-title":"CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security","author":"B. Hoh","year":"2007","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 161\u2013171. ACM Press, New York (2007)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-72037-9_8","volume-title":"Pervasive Computing","author":"J. Krumm","year":"2007","unstructured":"Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 127\u2013143. Springer, Heidelberg (2007)"},{"issue":"6","key":"4_CR13","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J. Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Personal Ubiquitous Comput.\u00a013(6), 391\u2013399 (2009)","journal-title":"Personal Ubiquitous Comput."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1145\/1859995.1860017","volume-title":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","author":"C.Y. Ma","year":"2010","unstructured":"Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. In: Proceedings of the sixteenth annual international conference on Mobile computing and networking. MobiCom 2010, pp. 185\u2013196. ACM Press, New York (2010)"},{"key":"4_CR15","unstructured":"Piorkowski, M., Sarafijanovic-Djukic, N., Grossglauser, M.: CRAWDAD data set epfl\/mobility (v. 2009-02-24) (February 2009), \n                  \n                    http:\/\/crawdad.cs.dartmouth.edu\/epfl\/mobility"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L. Rabiner","year":"1989","unstructured":"Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"4_CR17","unstructured":"Shokri, R., Freudiger, J., Hubaux, J.-P.: A unified framework for location privacy. Technical Report EPFL-REPORT-148708, EPFL, Switzerland (2010)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1655188.1655192","volume-title":"WPES 2009: Proceedings of the 8th ACM workshop on Privacy in the electronic society","author":"R. Shokri","year":"2009","unstructured":"Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.-P.: A distortion-based metric for location privacy. In: WPES 2009: Proceedings of the 8th ACM workshop on Privacy in the electronic society, pp. 21\u201330. ACM Press, New York (2009)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Boudec, J.-Y.L., Hubaux, J.-P.: Quantifying location privacy. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/1866919.1866936","volume-title":"Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society","author":"R. Shokri","year":"2010","unstructured":"Shokri, R., Troncoso, C., Diaz, C., Freudiger, J., Hubaux, J.-P.: Unraveling an old cloak: k-anonymity for location privacy. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society. WPES 2010, pp. 115\u2013118. ACM Press, New York (2010)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-70630-4_2","volume-title":"Privacy Enhancing Technologies","author":"C. Troncoso","year":"2008","unstructured":"Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 2\u201323. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22263-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:07:33Z","timestamp":1558310853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22263-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222627","9783642222634"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22263-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}