{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T21:54:47Z","timestamp":1759701287461,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T00:00:00Z","timestamp":1454025600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["6137205, U1405255, 61472310, 61202389"],"award-info":[{"award-number":["6137205, U1405255, 61472310, 61202389"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s00500-016-2040-2","type":"journal-article","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T10:07:24Z","timestamp":1454062044000},"page":"3907-3917","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism"],"prefix":"10.1007","volume":"21","author":[{"given":"Xinghua","family":"Li","sequence":"first","affiliation":[]},{"given":"Meixia","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,29]]},"reference":[{"key":"2040_CR1","doi-asserted-by":"crossref","unstructured":"Adar E, Huberman BA (2000) Free riding on Gnutella. First Monday 5(10):1\u201322","DOI":"10.5210\/fm.v5i10.792"},{"key":"2040_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad MW, Ansari MA (2012) A survey: soft computing in intelligent information retrieval systems. In: Proceedings of the 12th International Conference on Computational Science and Its Applications, pp 783\u2013796","DOI":"10.1109\/ICCSA.2012.15"},{"key":"2040_CR3","doi-asserted-by":"crossref","unstructured":"Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of the 17th International Conference on World Wide Web, pp 237\u2013246","DOI":"10.1145\/1367497.1367531"},{"key":"2040_CR4","unstructured":"Bernstein, Curve DJ (2006) New Diffie-Hellman speed records. In: Proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, pp 207\u2013228"},{"issue":"4","key":"2040_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"CY Chow","year":"2009","unstructured":"Chow CY, Mokbel MF, Aref WG (2009) Casper: query processing for location services without compromising privacy. ACM Trans Database Syst 34(4):1\u201324","journal-title":"ACM Trans Database Syst"},{"issue":"2","key":"2040_CR6","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"J Daniel","year":"2012","unstructured":"Daniel J, Bernstein Niels D, Lange TJ (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77\u201389","journal-title":"J Cryptogr Eng"},{"issue":"2","key":"2040_CR7","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s00779-013-0644-4","volume":"18","author":"M Ficco","year":"2014","unstructured":"Ficco M, Palmieri F, Castiglione A (2014) Hybrid indoor and outdoor location services for new generation mobile terminals. J Person Ubiquitiou Comput 18(2):271\u2013285","journal-title":"J Person Ubiquitiou Comput"},{"key":"2040_CR8","doi-asserted-by":"crossref","unstructured":"Freudiger J, Shokri R, Hubaux J (2009) On the optimal placement of mix zones. In: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, pp 216\u2013234","DOI":"10.1007\/978-3-642-03168-7_13"},{"issue":"1","key":"2040_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1\u201318","journal-title":"IEEE Trans Mobile Comput"},{"key":"2040_CR10","doi-asserted-by":"crossref","unstructured":"Golle P, Leyton-Brown K, Mironov I (2001) Incentives for sharing in peer-to-peer networks. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, pp 264\u2013267","DOI":"10.1145\/501158.501193"},{"key":"2040_CR11","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwal D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications,and Services, pp 163\u2013168","DOI":"10.1145\/1066116.1189037"},{"issue":"9","key":"2040_CR12","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1007\/s00500-014-1278-9","volume":"18","author":"J Hernandez","year":"2014","unstructured":"Hernandez J, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. Soft Comput 18(9):1659\u20131674","journal-title":"Soft Comput"},{"key":"2040_CR13","unstructured":"Hu H, Chen Q, Xu J (2013) VERDICT: privacy-preserving authentication of range queries in location-based services. In: Proceedings of the 29th IEEE International Conference on Data Engineering, pp 1312\u20131315"},{"key":"2040_CR14","unstructured":"Jung T, Li XY (2013) Search me if you can: privacy-preserving location query service. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 2760\u20132768"},{"key":"2040_CR15","doi-asserted-by":"crossref","unstructured":"Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. Proc Int Conf Pervasive Serv 2005:88\u201397","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"2040_CR16","doi-asserted-by":"crossref","unstructured":"Levin D, LaCurts K (2008) BitTorrent is an Auetion:Analyzing and Improving BitTorrent\u2019s Incentives. In: Proeeedings of the ACM SIGCOMM 2008 Conference on Data Communication, pp 243\u2013254","DOI":"10.1145\/1402958.1402987"},{"issue":"6","key":"2040_CR17","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1109\/TIFS.2013.2252011","volume":"8","author":"IT Lien","year":"2005","unstructured":"Lien IT, Lin YH, Shieh JR (2005) A novel privacy preserving location-based service protocol with secret circular shift for k-nn search. IEEE Trans Inf Forensics Secur 8(6):863\u2013873","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2040_CR18","doi-asserted-by":"crossref","unstructured":"Metre PB, Radhika KR, Gowrishankar G (2012) Survey of soft computing techniques for joint radio resource management. In: Proceedings of 2012 International Conference on Multimedia Computing and System, pp 562\u2013565","DOI":"10.1109\/ICMCS.2012.6320147"},{"key":"2040_CR19","doi-asserted-by":"crossref","unstructured":"Paulet R, Kaosar MG, Yi X, Bertino E (2012) Privacy-preserving and content-protecting location based queries. In: Proceedings of the 28th IEEE International Conference on Data Engineering, pp 44\u201353","DOI":"10.1109\/ICDE.2012.95"},{"key":"2040_CR20","doi-asserted-by":"crossref","unstructured":"Tang F, Li J, You L, Guo M (2015) Long-term location privacy protection for location-based services in mobile cloud computing. J Soft Comput (published online)","DOI":"10.1007\/s00500-015-1703-8"},{"issue":"10","key":"2040_CR21","doi-asserted-by":"crossref","first-page":"1817","DOI":"10.1007\/s00500-013-1019-5","volume":"17","author":"K Trawinski","year":"2013","unstructured":"Trawinski K, Alonso JK, Hernandez N (2013) A multiclassifier approach for topology-based wifi indoor localization. Soft Comput 17(10):1817\u20131831","journal-title":"Soft Comput"},{"key":"2040_CR22","doi-asserted-by":"crossref","unstructured":"Yang DJ, Fang X, Xue GL (2013) Truthful Incentive Mechanisms for K-Anonymity Location Privacy. In: Proceedings of the 32nd IEEE International Conference on Computer Communications, pp 783\u2013796","DOI":"10.1109\/INFCOM.2013.6567111"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-016-2040-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2040-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2040-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2040-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T23:52:31Z","timestamp":1567554751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-016-2040-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,29]]},"references-count":22,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["2040"],"URL":"https:\/\/doi.org\/10.1007\/s00500-016-2040-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2016,1,29]]}}}