{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:31:01Z","timestamp":1725744661833},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642402371"},{"type":"electronic","value":"9783642402388"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40238-8_12","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T13:26:54Z","timestamp":1376486814000},"page":"139-151","source":"Crossref","is-referenced-by-count":2,"title":["Differential Private Trajectory Obfuscation"],"prefix":"10.1007","author":[{"given":"Roland","family":"Assam","sequence":"first","affiliation":[]},{"given":"Marwan","family":"Hassani","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Seidl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ashbrook, D., Starner, T.: Using GPS to learn significant locations and predict movement across multiple users. UbiComp (2003)","DOI":"10.1007\/s00779-003-0240-0"},{"key":"12_CR2","unstructured":"Osman, A., Francesco, B., Mirco, N.: Never walk alone: Uncertainty for anonymity in moving objects databases. In: ICDE (2008)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Friedman, A., Schuster, A.: Data mining with differential privacy. In: KDD (2010)","DOI":"10.1145\/1835804.1835868"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Trans. on Knowl. and Data Eng. (2007)","DOI":"10.1109\/TKDE.2007.190662"},{"key":"12_CR6","unstructured":"Mohamed, F.: Query processing for location services without compromising privacy. In: VLDB (2006)"},{"key":"12_CR7","unstructured":"Manolis, T., Nikos, M.: Privacy Preservation in the Publication of Trajectories. In: MDM (2008)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Mcsherry, F., Talwar, K.: Mechanism design via differential privacy. In: FOC (2007)","DOI":"10.1109\/FOCS.2007.4389483"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Mcsherry, F.: Privacy integrated queries. In: SIGMOD (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"C.A. Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location Privacy Protection Through Obfuscation-Based Techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 47\u201360. Springer, Heidelberg (2007)"},{"key":"12_CR13","unstructured":"Hoh, B., Gruteser, M.: Protecting Location Privacy Through Path Confusion. In: SECURECOMM (2005)"},{"key":"12_CR14","unstructured":"Yu, Z., Li, Q., Chen, Y., Xie, X.: Understanding Mobility Based on GPS Data. In: UbiComp (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40238-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T16:01:19Z","timestamp":1558022479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40238-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642402371","9783642402388"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40238-8_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}