{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:17:52Z","timestamp":1742912272921,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642259586"},{"type":"electronic","value":"9783642259593"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-25959-3_17","type":"book-chapter","created":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T14:50:29Z","timestamp":1325429429000},"page":"218-233","source":"Crossref","is-referenced-by-count":7,"title":["Preserving Query Privacy in Urban Sensing Systems"],"prefix":"10.1007","author":[{"given":"Emiliano","family":"De Cristofaro","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., Srivastava, M.: Participatory Sensing. In: World Sensor Web Workshop (2006)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Chang, K., Shin, K.G.: Distributed authentication of program integrity verification in wireless sensor networks. ACM Trans. Inf. Syst. Secur.\u00a011 (2008)","DOI":"10.1145\/1341731.1341735"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of ACM\u00a024(2) (1981)","DOI":"10.1145\/358549.358563"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of ACM\u00a045(6) (1998)","DOI":"10.1145\/293347.293350"},{"key":"17_CR5","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"2001","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2001)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Cornelius, C., Kapadia, A., Kotz, D., Peebles, D., Shin, M., Triandopoulos, N.: AnonySense: Privacy-aware people-centric sensing. In: MobiSys (2008)","DOI":"10.1145\/1378600.1378624"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Das, T., Mohan, P., Padmanabhan, V., Ramjee, R., Sharma, A.: PRISM: Platform for Remote Sensing using Smartphones. In: MobiSys (2010)","DOI":"10.1145\/1814433.1814442"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Ding, X., Tsudik, G.: Privacy-preserving querying in wireless sensor networks. In: ICCCN (2009)","DOI":"10.1109\/ICCCN.2009.5235352"},{"key":"17_CR9","unstructured":"De Cristofaro, E., Soriente, C.: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure. In: WiSec (2011)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Ganti, R., Pham, N., Tsai, Y., Abdelzaher, T.: PoolView: Stream Privacy for Grassroots Participatory Sensing. In: SenSys (2008)","DOI":"10.1145\/1460412.1460440"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Huang, K., Kanhere, S., Hu, W.: Preserving Privacy in Participatory Sensing Systems. Computer Communications\u00a033(11) (2010)","DOI":"10.1016\/j.comcom.2009.08.012"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Lee, J., Hoh, B.: Sell Your Experiences: A Market Mechanism based Incentive for Participatory Sensing. In: PerCom (2010)","DOI":"10.1109\/PERCOM.2010.5466993"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Lu, H., Pan, W., Lane, N., Choudhury, T., Campbell, A.: SoundSense: Scalable Sound Sensing for People-Centric Applications on Mobile Phones. In: MobiSys (2009)","DOI":"10.1145\/1555816.1555834"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Trans. on Knowledge Discovery from Data (TKDD)\u00a01(1) (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Mathur, S., Jin, T., Kasturirangan, N., Chandrasekaran, J., Xue, W., Gruteser, M., Trappe, W.: ParkNet: Drive-by Sensing of Road-side Parking Statistics. In: MobiSys (2010)","DOI":"10.1145\/1814433.1814448"},{"key":"17_CR16","unstructured":"Menezes, A.: Elliptic curve public key cryptosystems. Kluwer (2002)"},{"key":"17_CR17","unstructured":"Mohan, P., Padmanabhan, V., Ramjee, R.: Rich Monitoring of Road and Traffic Conditions using Mobile Smartphones. In: SenSys (2008)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-19228-9_3","volume-title":"Open Research Problems in Network Security","author":"S. Ortolani","year":"2011","unstructured":"Ortolani, S., Conti, M., Crispo, B., Di Pietro, R.: Event Handoff Unobservability in WSN. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds.) iNetSec 2010. LNCS, vol.\u00a06555, pp. 20\u201328. Springer, Heidelberg (2011)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Ortolani, S., Conti, M., Crispo, B., Di Pietro, R.: Events privacy in WSNs: A new model and its application. In: WoWMoM (2011)","DOI":"10.1109\/WoWMoM.2011.5986491"},{"key":"17_CR20","unstructured":"Paulos, E., Honicky, R., Goodman, E.: Sensing Atmosphere. In: SenSys Workshops (2007)"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-15497-3_39","volume-title":"Computer Security \u2013 ESORICS 2010","author":"D. Perito","year":"2010","unstructured":"Perito, D., Tsudik, G.: Secure Code Update for Embedded Devices Via Proofs of Secure Erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 643\u2013662. Springer, Heidelberg (2010)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-12654-3_9","volume-title":"Pervasive Computing","author":"S. Reddy","year":"2010","unstructured":"Reddy, S., Estrin, D., Srivastava, M.: Recruitment Framework for Participatory Sensing Data collections. In: Flor\u00e9en, P., Kr\u00fcger, A., Spasojevic, M. (eds.) Pervasive Computing. LNCS, vol.\u00a06030, pp. 138\u2013155. Springer, Heidelberg (2010)"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications\u00a016(4) (1998)","DOI":"10.1109\/49.668972"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Shi, J., Zhang, R., Liu, Y., Zhang, Y.: PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems. In: INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462147"},{"key":"17_CR25","unstructured":"Sion, R., Carbunar, B.: On the Computational Practicality of Private Information Retrieval. In: NDSS (2007)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-Anonymity: A model for Protecting Privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.\u00a010(5) (2002)","DOI":"10.1142\/S0218488502001648"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25959-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T16:46:50Z","timestamp":1556038010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25959-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642259586","9783642259593"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25959-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}