{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T03:01:32Z","timestamp":1761102092057},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,11,16]],"date-time":"2013-11-16T00:00:00Z","timestamp":1384560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Geoinformatica"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s10707-013-0194-y","type":"journal-article","created":{"date-parts":[[2013,11,14]],"date-time":"2013-11-14T22:33:44Z","timestamp":1384468424000},"page":"135-164","source":"Crossref","is-referenced-by-count":13,"title":["Effective mix-zone anonymization techniques for mobile travelers"],"prefix":"10.1007","volume":"18","author":[{"given":"Balaji","family":"Palanisamy","sequence":"first","affiliation":[]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,16]]},"reference":[{"key":"194_CR1","doi-asserted-by":"crossref","unstructured":"Cuellar JR, Morris JB, Mulligan DK, Peterson J, Polk J (2003) Geopriv requirements. IETF Internet Draft","DOI":"10.17487\/rfc3693"},{"key":"194_CR2","unstructured":"U.S. Geological Survey. http:\/\/www.usgs.gov ."},{"key":"194_CR3","unstructured":"USAToday. Authorities: gps systems used to stalk woman. http:\/\/www.usatoday.com\/tech\/news\/2002-12-30-gps-stalkerx.htm"},{"key":"194_CR4","unstructured":"Location Privacy Protection Act of 2001. http:\/\/www.techlawjournal.com\/cong107\/privacy\/location\/s1164is.asp"},{"key":"194_CR5","unstructured":"Chen A GCreep: google engineer stalked teens, spied on chats. Gawker, September 2010 http:\/\/gawker.com\/5637234\/"},{"key":"194_CR6","unstructured":"Aggarwal C (2005) On k-anonymity and the curse of dimensionality. In: VLDB"},{"key":"194_CR7","doi-asserted-by":"crossref","unstructured":"Amini S, Lindqvist J, Hong J, Lin J, Toch E, Sadeh N (2011) Cache\u2019: caching location-enhanced content to improve user privacy. In: Mobisys","DOI":"10.1145\/1999995.2000015"},{"key":"194_CR8","doi-asserted-by":"crossref","unstructured":"Ardagna C, Cremonini M, Vimercati S, Samarati P (2011) An obfuscation-based approach for protecting location privacy. In: IEEE TDSC","DOI":"10.1109\/TDSC.2009.25"},{"key":"194_CR9","doi-asserted-by":"crossref","unstructured":"Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with PrivacyGrid. In: WWW","DOI":"10.1145\/1367497.1367531"},{"key":"194_CR10","doi-asserted-by":"crossref","unstructured":"Bayardo R, Agrawal R (2005) Data privacy through optimal k-anonymization. In: ICDE","DOI":"10.1109\/ICDE.2005.42"},{"key":"194_CR11","doi-asserted-by":"crossref","unstructured":"Beresford A, Stajano F (2003) Location privacy in pervasive computing. Pervasive Computing, IEEE","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"194_CR12","doi-asserted-by":"crossref","unstructured":"Bettini C, Mascetti S, Wang X, Freni D, Jajodia S (2009) Anonymity and historical-anonymity in location-based services. In: Privacy in location-based applications: introduction, research issues and applications, lecture notes of computer science 5599. Springer","DOI":"10.1007\/978-3-642-03511-1_1"},{"key":"194_CR13","doi-asserted-by":"crossref","unstructured":"Buttyan L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: ESAS","DOI":"10.1007\/978-3-540-73275-4_10"},{"key":"194_CR14","doi-asserted-by":"crossref","unstructured":"Chow C, Mokbel M (2007) Enabling private continuous queries for revealed user locations. In: SSTD","DOI":"10.1007\/978-3-540-73540-3_15"},{"key":"194_CR15","doi-asserted-by":"crossref","unstructured":"Chow C, Mokbel M, Bao J, Liu X (2011) Query-aware location anonymization for road networks. In: Geoinformatica","DOI":"10.1007\/s10707-010-0117-0"},{"key":"194_CR16","doi-asserted-by":"crossref","unstructured":"Dewri R, Ray I, Ray I, Whitley D (2010) Query m-invariance: preventing query disclosures in continuous location-based services. In: MDM","DOI":"10.1109\/MDM.2010.52"},{"key":"194_CR17","doi-asserted-by":"crossref","unstructured":"Daz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. PETS","DOI":"10.1007\/3-540-36467-6_5"},{"key":"194_CR18","unstructured":"Freudiger J, Raya M, F\u00e9legyhazi M, Papadimitratos P, Hubaux J-P (2007) Mix-zones for location privacy in vehicular networks. In: WiN-ITS"},{"key":"194_CR19","doi-asserted-by":"crossref","unstructured":"Freudiger J, Shokri R, Hubaux J-P (2009) On the optimal placement of mix zones. In: PETS","DOI":"10.1007\/978-3-642-03168-7_13"},{"key":"194_CR20","doi-asserted-by":"crossref","unstructured":"Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: ICDCS","DOI":"10.1109\/ICDCS.2005.48"},{"key":"194_CR21","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Skiadopoulos S (2007) PRIVE: anonymous location-based queries in distributed mobile systems. In: WWW","DOI":"10.1145\/1242572.1242623"},{"key":"194_CR22","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Kantarcioglu M, Bertino E (2011) Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. In: GeoInformatica","DOI":"10.1007\/s10707-010-0121-4"},{"key":"194_CR23","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K (2008) Private queries in location based services: anonymizers are not necessary. In: SIGMOD","DOI":"10.1145\/1376616.1376631"},{"key":"194_CR24","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys","DOI":"10.1145\/1066116.1189037"},{"key":"194_CR25","doi-asserted-by":"crossref","unstructured":"Hengartner U, Steenkiste P (2003) Protecting access to people location information. In: security in pervasive computing","DOI":"10.1145\/990036.990039"},{"key":"194_CR26","doi-asserted-by":"crossref","unstructured":"Hong J, Landay J (2004) An architecture for privacy-sensitive ubiquitous computing. In: Mobisys. pp 177\u2013189","DOI":"10.1145\/990064.990087"},{"key":"194_CR27","unstructured":"Karger P, Frankel Y (1995) Security and privacy threats to its. In: World Congress on Intelligent Transport Systems"},{"key":"194_CR28","doi-asserted-by":"crossref","unstructured":"Krumm J (2007) Inference attacks on location tracks. In: PERVASIVE","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"194_CR29","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-Diversity: privacy beyond k-Anonymity. In: ICDE","DOI":"10.1109\/ICDE.2006.1"},{"key":"194_CR30","doi-asserted-by":"crossref","unstructured":"Meyerowitz J, Choudhury R (2009) Hiding stars with fireworks: location privacy through camouflage. In: MOBICOM","DOI":"10.1145\/1614320.1614358"},{"key":"194_CR31","unstructured":"Mokbel M, Chow C, Aref W (2006) The new casper: query processing for location services without compromising privacy. In: VLDB"},{"key":"194_CR32","doi-asserted-by":"crossref","unstructured":"Mouratidis K, Yiu M (2010) Anonymous query processing in road networks. In: TKDE","DOI":"10.1109\/TKDE.2009.48"},{"key":"194_CR33","unstructured":"Pesti P, Bamba B, Doo M, Liu L, Palanisamy B, Weber M (2009) GTMobiSIM: a mobile trace generator for road networks. College of computing, georgia institute of technology. http:\/\/code.google.com\/p\/gt-mobisim\/"},{"key":"194_CR34","doi-asserted-by":"crossref","unstructured":"Palanisamy B, Liu L (2011) MobiMix: protecting location privacy with mix-zones over road networks. In: ICDE","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"194_CR35","unstructured":"Palanisamy B, Liu L Attack-resilient mix-zones over road networks: architecture and algorithms. Georgia Tech Technical Report"},{"key":"194_CR36","doi-asserted-by":"crossref","unstructured":"Pan X, Meng X, Xu J (2009) Distortion based anonymity for continuous queries in location based mobile services. In: GIS","DOI":"10.1145\/1653771.1653808"},{"key":"194_CR37","doi-asserted-by":"crossref","unstructured":"Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. PETS","DOI":"10.1007\/3-540-36467-6_4"},{"key":"194_CR38","doi-asserted-by":"crossref","unstructured":"Shmatikov V, Wang M (2006) Timing analysis in low-latency mix networks: attacks and defenses. In: ESORICS","DOI":"10.1007\/11863908_2"},{"key":"194_CR39","unstructured":"Toth G, Hornak Z, Vajda F (2004) Measuring anonymity revisited. In: Norsec"},{"key":"194_CR40","doi-asserted-by":"crossref","unstructured":"Wang T, Liu L (2009) Privacy-aware mobile services over road networks. In: VLDB","DOI":"10.14778\/1687627.1687745"},{"key":"194_CR41","doi-asserted-by":"crossref","unstructured":"Wang T, Liu L (2010) Execution assurance for massive computing tasks. In: IEICE transactions on information and systems, Vol. E93-D, No. 6, Special session on Info-Plosion","DOI":"10.1587\/transinf.E93.D.1343"},{"key":"194_CR42","unstructured":"Williams P, Sion R (2008) Usable PIR. In: NDSS"}],"container-title":["GeoInformatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-013-0194-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10707-013-0194-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-013-0194-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T19:05:35Z","timestamp":1564686335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10707-013-0194-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,16]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["194"],"URL":"https:\/\/doi.org\/10.1007\/s10707-013-0194-y","relation":{},"ISSN":["1384-6175","1573-7624"],"issn-type":[{"value":"1384-6175","type":"print"},{"value":"1573-7624","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,16]]}}}