{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:59:14Z","timestamp":1773323954971,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,11,27]],"date-time":"2012-11-27T00:00:00Z","timestamp":1353974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s00779-012-0633-z","type":"journal-article","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T12:26:33Z","timestamp":1353932793000},"page":"163-175","source":"Crossref","is-referenced-by-count":200,"title":["A classification of location privacy attacks and approaches"],"prefix":"10.1007","volume":"18","author":[{"given":"Marius","family":"Wernke","sequence":"first","affiliation":[]},{"given":"Pavel","family":"Skvortsov","sequence":"additional","affiliation":[]},{"given":"Frank","family":"D\u00fcrr","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Rothermel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,27]]},"reference":[{"key":"633_CR1","doi-asserted-by":"crossref","unstructured":"Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the 24th international conference on data engineering (ICDE \u201908), Washington, DC, USA, pp 376\u2013385","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"633_CR2","doi-asserted-by":"crossref","unstructured":"Ardagna C, Cremonini M, Damiani E, De Capitani di Vimercati S, Samarati P (2007) Location privacy protection through obfuscation-based techniques. In: Proceedings of the 21st annual IFIP WG 11.3 working conference on data and applications security, Redondo Beach, CA, USA, pp 47\u201360","DOI":"10.1007\/978-3-540-73538-0_4"},{"issue":"4","key":"633_CR3","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.sysarc.2009.01.003","volume":"55","author":"CA Ardagna","year":"2009","unstructured":"Ardagna CA, Cremonini M, Gianini G (2009) Landscape-aware location-privacy protection in location-based services. J Syst Archit 55(4):243\u2013254","journal-title":"J Syst Archit"},{"key":"633_CR4","doi-asserted-by":"crossref","unstructured":"Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceeding of the 17th international conference on world wide web (WWW \u201908), Beijing, China, pp 237\u2013246","DOI":"10.1145\/1367497.1367531"},{"key":"633_CR5","doi-asserted-by":"crossref","unstructured":"Barker K, Askari M, Banerjee M, Ghazinour K, Mackas B, Majedi M, Pun S, Williams A (2009) A data privacy taxonomy. In: Proceedings of the 26th British national conference on databases: dataspace: the final frontier (BNCOD 26), Birmingham, UK, pp 42\u201354","DOI":"10.1007\/978-3-642-02843-4_7"},{"issue":"1","key":"633_CR6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46\u201355","journal-title":"IEEE Pervasive Comput"},{"key":"633_CR7","unstructured":"Beresford AR, Stajano F (2004) Mix zones: user privacy in location-aware services. In: Proceedings of the second IEEE annual conference on pervasive computing and communications workshops (PerCom \u201904 Workshops), pp 127\u2013131"},{"key":"633_CR8","doi-asserted-by":"crossref","unstructured":"Bettini C, Mascetti S, Wang XS, Freni D, Jajodia S (2009) Anonymity and historical-anonymity in location-based services. In: Bettini C, Jajodia S, Samarati P, Wang X (eds) Privacy in location-based applications, lecture notes in computer science, vol 5599. Springer, Berlin, pp 1\u201330","DOI":"10.1007\/978-3-642-03511-1_1"},{"key":"633_CR9","doi-asserted-by":"crossref","unstructured":"Bettini C, Wang X, Jajodia S (2005) Protecting privacy against location-based personal identification. In: Jonker W, Petkovic M (eds) Secure data management, lecture notes in computer science, vol 3674. Springer, Berlin, pp 185\u2013199","DOI":"10.1007\/11552338_13"},{"key":"633_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.amc.2004.04.081","volume":"166","author":"CW Chan","year":"2005","unstructured":"Chan CW, Chang CC (2005) A scheme for threshold multi-secret sharing. Appl Math Comput 166:1\u201314","journal-title":"Appl Math Comput"},{"key":"633_CR11","doi-asserted-by":"crossref","unstructured":"Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proceedings of the 6th international conference on privacy enhancing technologies (PET \u201906), pp 393\u2013412. Springer, Berlin","DOI":"10.1007\/11957454_23"},{"issue":"1","key":"633_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2031331.2031335","volume":"13","author":"CY Chow","year":"2011","unstructured":"Chow CY, Mokbel MF (2011) Trajectory privacy in location-based services and data publication. SIGKDD Explor 13(1):19\u201329","journal-title":"SIGKDD Explor"},{"issue":"2","key":"633_CR13","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow CY, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2):351\u2013380","journal-title":"GeoInformatica"},{"key":"633_CR14","doi-asserted-by":"crossref","unstructured":"Damiani ML, Bertino E, Silvestri C (2009) Protecting location privacy against spatial inferences: the probe approach. In: Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 international workshop on security and privacy in GIS and LBS (SPRINGL \u201909), Seattle, Washington, pp 32\u201341","DOI":"10.1145\/1667502.1667511"},{"issue":"2","key":"633_CR15","first-page":"123","volume":"3","author":"ML Damiani","year":"2010","unstructured":"Damiani ML, Bertino E, Silvestri C (2010) The probe framework for the personalized cloaking of private locations. Trans Data Priv 3(2):123\u2013148","journal-title":"Trans Data Priv"},{"key":"633_CR16","doi-asserted-by":"crossref","unstructured":"Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proceedings of the third international conference on pervasive computing (Pervasive \u201905), Munich, Germany, pp 152\u2013170","DOI":"10.1007\/11428572_10"},{"key":"633_CR17","doi-asserted-by":"crossref","unstructured":"D\u00fcrr F, Skvortsov P, Rothermel K (2011) Position sharing for location privacy in non-trusted systems. In: Proceedings of the 9th IEEE international conference on pervasive computing and communications (PerCom \u201911), Seattle, USA, pp 189 \u2013196","DOI":"10.1109\/PERCOM.2011.5767584"},{"key":"633_CR18","unstructured":"Facebook (2012) Places. http:\/\/www.facebook.com\/places"},{"key":"633_CR19","unstructured":"Foursquare (2012) http:\/\/www.foursquare.com"},{"key":"633_CR20","doi-asserted-by":"crossref","unstructured":"Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: Proceedings of the 25th IEEE international conference on distributed computing systems (ICDCS \u201905), pp 620\u2013629","DOI":"10.1109\/ICDCS.2005.48"},{"issue":"1","key":"633_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1\u201318","journal-title":"IEEE Trans Mob Comput"},{"key":"633_CR22","doi-asserted-by":"crossref","unstructured":"Ghinita G, Damiani ML, Silvestri C, Bertino E (2009) Preventing velocity-based linkage attacks in location-aware applications. In: Proceedings of the 17th ACM SIGSPATIAL international conference on advances in geographic information systems (GIS \u201909), Seattle, Washington, pp 246\u2013255","DOI":"10.1145\/1653771.1653807"},{"key":"633_CR23","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD international conference on management of data (SIGMOD \u201908), Vancouver, Canada, pp 121\u2013132","DOI":"10.1145\/1376616.1376631"},{"key":"633_CR24","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Skiadopoulos S (2007) Mobihide: a mobile peer-to-peer system for anonymous location-based queries. In: Proceedings of the 10th international conference on advances in spatial and temporal databases (SSTD \u201907), Boston, MA, USA, pp 221\u2013238","DOI":"10.1007\/978-3-540-73540-3_13"},{"key":"633_CR25","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Skiadopoulos S (2007) Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th international conference on world wide web (WWW \u201907), Banff, Alberta, Canada, pp 371\u2013380","DOI":"10.1145\/1242572.1242623"},{"key":"633_CR26","doi-asserted-by":"crossref","unstructured":"Gilbert P, Cox LP, Jung J, Wetherall D (2010) Toward trustworthy mobile sensing. In: Proceedings of the 11th workshop on mobile computing systems and applications (HotMobile \u201910), Annapolis, Maryland, pp 31\u201336","DOI":"10.1145\/1734583.1734592"},{"key":"633_CR27","doi-asserted-by":"crossref","unstructured":"Golle P, Partridge K (2009) On the anonymity of home\/work location pairs. In: Proceedings of the 7th international conference on pervasive computing (Pervasive \u201909), Nara, Japan, pp 390\u2013397","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"633_CR28","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services (MobiSys \u201903), San Francisco, California, pp 31\u201342","DOI":"10.1145\/1066116.1189037"},{"key":"633_CR29","doi-asserted-by":"crossref","unstructured":"Gutscher A (2006) Coordinate transformation\u2014a solution for the privacy problem of location based services? In: Proceedings of the 20th international conference on parallel and distributed processing (IPDPS \u201906), Rhodes Island, Greece, pp 354\u2013354","DOI":"10.1109\/IPDPS.2006.1639681"},{"key":"633_CR30","doi-asserted-by":"crossref","unstructured":"Hashem T, Kulik L, Zhang R (2010) Privacy preserving group nearest neighbor queries. In: Proceedings of the 13th international conference on extending database technology (EDBT \u201910), Lausanne, Switzerland, pp 489\u2013500","DOI":"10.1145\/1739041.1739100"},{"key":"633_CR31","doi-asserted-by":"crossref","unstructured":"Hoh B, Gruteser M, Herring R, Ban J, Work D, Herrera JC, Bayen AM, Annavaram M, Jacobson Q (2008) Virtual trip lines for distributed privacy-preserving traffic monitoring. In: Proceeding of the 6th international conference on mobile systems, applications, and services (MobiSys \u201908), Breckenridge, CO, USA, pp 15\u201328","DOI":"10.1145\/1378600.1378604"},{"key":"633_CR32","doi-asserted-by":"crossref","unstructured":"Hoh B, Gruteser M, Xiong H, Alrabady A (2007) Preserving privacy in gps traces via uncertainty-aware path cloaking. In: Proceedings of the 14th ACM conference on computer and communications security (CCS \u201907), Alexandria, Virginia, USA, pp 161\u2013171","DOI":"10.1145\/1315245.1315266"},{"key":"633_CR33","doi-asserted-by":"crossref","unstructured":"Hu H, Xu J (2009) Non-exposure location anonymity. In: Proceedings of the 25th IEEE international conference on data engineering (ICDE \u201909), pp 1120\u20131131","DOI":"10.1109\/ICDE.2009.106"},{"issue":"12","key":"633_CR34","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719\u20131733","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"633_CR35","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJCSE.2010.036819","volume":"5","author":"A Khoshgozaran","year":"2010","unstructured":"Khoshgozaran A, Shahabi C (2010) A taxonomy of approaches to preserve location privacy in location-based services. Int J Comput Sci Eng 5(2):86\u201396","journal-title":"Int J Comput Sci Eng"},{"key":"633_CR36","doi-asserted-by":"crossref","unstructured":"Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of the international conference on pervasive services (ICPS \u201905), pp 88\u201397","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"633_CR37","doi-asserted-by":"crossref","unstructured":"Krumm J (2007) Inference attacks on location tracks. In: Proceedings of the 5th international conference on pervasive computing (Pervasive \u201907). Springer, Toronto, pp 127\u2013143","DOI":"10.1007\/978-3-540-72037-9_8"},{"issue":"6","key":"633_CR38","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"Krumm J (2009) A survey of computational location privacy. Pers Ubiquit Comput 13(6):391\u2013399","journal-title":"Pers Ubiquit Comput"},{"key":"633_CR39","doi-asserted-by":"crossref","unstructured":"Lee JG, Han J, Whang KY (2007) Trajectory clustering: a partition-and-group framework. In: Proceedings of the 2007 ACM SIGMOD international conference on management of data (SIGMOD \u201907), Beijing, China, pp 593\u2013604","DOI":"10.1145\/1247480.1247546"},{"key":"633_CR40","doi-asserted-by":"crossref","unstructured":"Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd IEEE international conference on data engineering (ICDE \u201907), pp 106\u2013115","DOI":"10.1109\/ICDE.2007.367856"},{"key":"633_CR41","unstructured":"Loopt (2012) http:\/\/www.loopt.com"},{"key":"633_CR42","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(3):3","DOI":"10.1145\/1217299.1217302"},{"key":"633_CR43","doi-asserted-by":"crossref","unstructured":"Marias G, Delakouridis C, Kazatzopoulos L, Georgiadis P (2005) Location privacy through secret sharing techniques. In: Proceedings of the 1st international IEEE WoWMoM workshop on trust, security and privacy for ubiquitous computing (WOWMOM \u201905), pp 614\u2013620","DOI":"10.1109\/WOWMOM.2005.60"},{"key":"633_CR44","doi-asserted-by":"crossref","unstructured":"Mascetti S, Bettini C, Wang XS, Freni D, Jajodia S (2009) Providenthider: an algorithm to preserve historical k-anonymity in lbs. In: Proceedings of the 10th IEEE international conference on mobile data management (MDM \u201909), pp 172\u2013181. Taipei, Taiwan","DOI":"10.1109\/MDM.2009.28"},{"issue":"4","key":"633_CR45","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s00778-010-0213-7","volume":"20","author":"S Mascetti","year":"2011","unstructured":"Mascetti S, Freni D, Bettini C, Wang XS, Jajodia S (2011) Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J 20(4):541\u2013566","journal-title":"VLDB J"},{"key":"633_CR46","doi-asserted-by":"crossref","unstructured":"Mokbel MF (2007) Privacy in location-based services: State-of-the-art and research directions. In: Proceedings of the 8th international conference on mobile data management (MDM \u201907), p 228","DOI":"10.1109\/MDM.2007.45"},{"key":"633_CR47","unstructured":"Mokbel MF, Chow CY, Aref WG (2006) The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on very large data bases (VLDB \u201906), Seoul, Korea, pp 763\u2013774"},{"key":"633_CR48","doi-asserted-by":"crossref","unstructured":"Palanisamy B, Liu L (2011) Mobimix: protecting location privacy with mix-zones over road networks. In: Proceedings of the 27th IEEE international conference on data engineering (ICDE \u201911), pp 494\u2013505","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"633_CR49","doi-asserted-by":"crossref","unstructured":"Pedreschi D, Bonchi F, Turini F, Verykios VS, Atzori M, Malin B, Moelans B, Saygin Y (2008) Privacy protection: regulations and technologies, opportunities and threats. In: Mobility, data mining and privacy. Springer, Berlin, pp 101\u2013119","DOI":"10.1007\/978-3-540-75177-9_5"},{"key":"633_CR50","unstructured":"Privacy Rights Clearinghouse (2012) Privacy rights clearinghouse. http:\/\/www.privacyrights.org\/data-breach"},{"key":"633_CR51","unstructured":"Qype (2012) http:\/\/www.qype.com"},{"key":"633_CR52","doi-asserted-by":"crossref","unstructured":"Shankar P, Ganapathy V, Iftode L (2009) Privately querying location-based services with sybilquery. In: Proceedings of the 11th international conference on ubiquitous computing (UbiComp \u201909), Orlando, Florida, USA, pp 31\u201340","DOI":"10.1145\/1620545.1620550"},{"key":"633_CR53","doi-asserted-by":"crossref","unstructured":"Shokri R, Theodorakopoulos G, Le Boudec J, Hubaux J (2011) Quantifying location privacy. In: Proceedings of the 31st IEEE symposium on security and privacy (SP \u201911), Berleley\/Oakland, California, USA, pp 247\u2013262","DOI":"10.1109\/SP.2011.18"},{"key":"633_CR54","doi-asserted-by":"crossref","unstructured":"Skvortsov P, D\u00fcrr F, Rothermel K (2012) Map-aware position sharing for location privacy in non-trusted systems. In: Proceedings of the 10th international conference on pervasive computing (Pervasive \u201912), Newcastle, UK, pp 388\u2013405","DOI":"10.1007\/978-3-642-31205-2_24"},{"key":"633_CR55","doi-asserted-by":"crossref","unstructured":"Solanas A, Domingo-Ferrer J, Mart\u00ednez-Ballest\u00e9 A (2008) Location privacy in location-based services: beyond ttp-based schemes. In: International workshop on privacy in location-based applications (PiLBA \u201908), Malaga, Spain","DOI":"10.1016\/j.comcom.2008.01.007"},{"key":"633_CR56","doi-asserted-by":"crossref","unstructured":"Solanas A, Seb\u00e9 F, Domingo-Ferrer J (2008) Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond. In: Proceedings of the 2008 international workshop on privacy and anonymity in information society (PAIS \u201908), Nantes, France, pp 61\u201369","DOI":"10.1145\/1379287.1379300"},{"key":"633_CR57","doi-asserted-by":"crossref","unstructured":"Talukder N, Ahamed SI (2010) Preventing multi-query attack in location-based services. In: Proceedings of the third ACM conference on wireless network security (WiSec \u201910), Hoboken, New Jersey, USA, pp 25\u201336","DOI":"10.1145\/1741866.1741873"},{"key":"633_CR58","doi-asserted-by":"crossref","unstructured":"Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: Proceedings of the 9th international conference on mobile data management (MDM \u201908), Beijing, China, pp 65\u201372","DOI":"10.1109\/MDM.2008.29"},{"key":"633_CR59","doi-asserted-by":"crossref","unstructured":"Wang T, Liu L (2009) From data privacy to location privacy. In: Tsai JJP, Yu PS (eds) Machine learning in cyber trust: security, privacy, and reliability, chap 9. Springer, Berlin, pp 217\u2013247","DOI":"10.1007\/978-0-387-88735-7_9"},{"key":"633_CR60","doi-asserted-by":"crossref","unstructured":"Wernke M, D\u00fcrr F, Rothermel K (2012) PShare: position sharing for location privacy based on multi-secret sharing. In: Proceedings of the 10th IEEE international conference on pervasive computing and communications (PerCom \u201912), Lugano, Switzerland, pp 153\u2013161","DOI":"10.1109\/PerCom.2012.6199862"},{"issue":"2","key":"633_CR61","first-page":"1","volume":"36","author":"ML Yiu","year":"2011","unstructured":"Yiu ML, Jensen CS, M\u00f8ller J, Lu H (2011) Design and analysis of a ranking approach to private location-based services. ACM Trans Database Syst 36(2):1\u201342","journal-title":"ACM Trans Database Syst"},{"issue":"2","key":"633_CR62","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s10707-008-0047-2","volume":"13","author":"C Zhang","year":"2009","unstructured":"Zhang C, Huang Y (2009) Cloaking locations for anonymous location based services: a hybrid approach. Geoinformatica 13(2):159\u2013182","journal-title":"Geoinformatica"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-012-0633-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-012-0633-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-012-0633-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T03:24:18Z","timestamp":1562383458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-012-0633-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,27]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["633"],"URL":"https:\/\/doi.org\/10.1007\/s00779-012-0633-z","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,27]]}}}