{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:25:20Z","timestamp":1740122720389,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T00:00:00Z","timestamp":1579824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T00:00:00Z","timestamp":1579824000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s10776-020-00478-4","type":"journal-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T18:02:49Z","timestamp":1579888969000},"page":"433-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Approach for Privacy-Preserving of the Client\u2019s Location and Query in M-Business Supplying LBS Services"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2623-5118","authenticated-orcid":false,"given":"Ahmed","family":"Aloui","sequence":"first","affiliation":[]},{"given":"Okba","family":"Kazar","sequence":"additional","affiliation":[]},{"given":"Samir","family":"Bourekkache","sequence":"additional","affiliation":[]},{"given":"Fouzia","family":"Omary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,24]]},"reference":[{"key":"478_CR1","unstructured":"S. Steiniger, M. Neun, A. Edwardes, Foundations of location based services lesson 1 cartouche 1- lecture notes on lbs, v. 1.0 2008."},{"key":"478_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.elerap.2016.03.005","volume":"18","author":"C Piao","year":"2016","unstructured":"C. Piao, X. Li, X. Pan and C. Zhang, User privacy protection for a mobile commerce alliance, Electronic Commerce Research and Applications, Vol. 18, pp. 58\u201370, 2016.","journal-title":"Electronic Commerce Research and Applications"},{"key":"478_CR3","doi-asserted-by":"crossref","unstructured":"R. Al-Dhubhani, J.M. Cazalas, An adaptive geo-indistinguishability mechanism for continuous lbs queries. Wireless Networks  pp. 1\u201319, 2017.","DOI":"10.1109\/Anti-Cybercrime.2017.7905291"},{"key":"478_CR4","doi-asserted-by":"crossref","unstructured":"G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, K.L. Tan, Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, (pp. 121\u2013132. ACM 2008).","DOI":"10.1145\/1376616.1376631"},{"key":"478_CR5","unstructured":"B. Gedik, L. Liu, Location privacy in mobile systems: A personalized anonymization model. In: ICDCS 2005 Proceedings 25th IEEE international conference on distributed computing systems, (pp. 620\u2013629. IEEE 2005)."},{"key":"478_CR6","doi-asserted-by":"crossref","unstructured":"M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on Mobile systems, applications and services, (pp. 31\u201342. ACM 2003).","DOI":"10.1145\/1066116.1189037"},{"key":"478_CR7","doi-asserted-by":"crossref","unstructured":"H. Kido, Y. Yanagisawa, T. Satoh, Protection of location privacy using dummies for location-based services. In: 21st International Conference on Data Engineering Workshops, 2005, (pp. 1248\u20131248. IEEE, 2005).","DOI":"10.1109\/ICDE.2005.269"},{"key":"478_CR8","unstructured":"H. Lu, C. Jensen, M. Yiu, A3d: Anonymity area aware, dummy-based location privacy in mobile services. In: Proc. Data Eng. for Wireless and Mobile Access (MobiDE\u201908) 2008."},{"key":"478_CR9","unstructured":"M.F. Mokbel, C.Y. Chow, W.G. Aref, The new casper: Query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases, pp. 763\u2013774. VLDB Endowment 2006."},{"key":"478_CR10","doi-asserted-by":"crossref","unstructured":"U. Hengartner, Hiding location information from location-based services. In: 2007 International Conference on Mobile Data Management, (pp. 268\u2013272. IEEE 2007).","DOI":"10.1109\/MDM.2007.56"},{"key":"478_CR11","unstructured":"F. Anuar, U. Gretzel, Privacy concerns in the context of location-based services for tourism. In: ENTER 2011 Conference, 2011."},{"issue":"4","key":"478_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/14636690810887526","volume":"10","author":"JV Chen","year":"2008","unstructured":"J. V. Chen, W. Ross and S. F. Huang, Privacy, trust, and justice considerations for location-based mobile telecommunication services, Info, Vol. 10, No. 4, pp. 30\u201345, 2008.","journal-title":"Info"},{"key":"478_CR13","doi-asserted-by":"crossref","unstructured":"C. Piao, S. Dong, L. Cui, A novel scheme on service recommendation for mobile users based on location privacy protection. In: IEEE 10th International Conference on e-Business Engineering (ICEBE), 2013, pp. 300\u2013305. IEEE 2013.","DOI":"10.1109\/ICEBE.2013.46"},{"issue":"1","key":"478_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"A. R. Beresford and F. Stajano, Location privacy in pervasive computing, IEEE Pervasive Computing, Vol. 2, No. 1, pp. 46\u201355, 2003.","journal-title":"IEEE Pervasive Computing"},{"issue":"3","key":"478_CR15","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1007\/s11277-015-2300-y","volume":"82","author":"I Memon","year":"2015","unstructured":"I. Memon, Authentication user\u2019s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services, Wireless Personal Communications, Vol. 82, No. 3, pp. 1585\u20131600, 2015.","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"478_CR16","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2012","unstructured":"X. Pan, J. Xu and X. Meng, Protecting location privacy against location-dependent attacks in mobile services, IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 8, pp. 1506\u20131519, 2012.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"478_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s40558-016-0056-1","volume":"16","author":"S Saravanan","year":"2016","unstructured":"S. Saravanan and B. S. Ramakrishnan, Preserving privacy in the context of location based services through location hider in mobile-tourism, Information Technology & Tourism, Vol. 16, No. 2, pp. 229\u2013248, 2016.","journal-title":"Information Technology & Tourism"},{"key":"478_CR18","doi-asserted-by":"crossref","unstructured":"J. Um, H. Kim, Y. Choi, J. Chang, A new grid-based cloaking algorithm for privacy protection in location-based services. In: 11th IEEE International Conference on High Performance Computing and Communications, 2009. HPCC\u201909, pp. 362\u2013368. IEEE 2009.","DOI":"10.1109\/HPCC.2009.47"},{"key":"478_CR19","doi-asserted-by":"crossref","unstructured":"B. Bamba, L. Liu, P. Pesti, T. Wang, Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web, (pp. 237\u2013246. ACM, 2008).","DOI":"10.1145\/1367497.1367531"},{"key":"478_CR20","doi-asserted-by":"crossref","unstructured":"H. Lee, B.S. Oh, H.i. Kim, J. Chang, Grid-based cloaking area creation scheme supporting continuous location-based services. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, (pp. 537\u2013543. ACM 2012).","DOI":"10.1145\/2245276.2245379"},{"key":"478_CR21","doi-asserted-by":"crossref","unstructured":"T. Xu, Y. Cai, Location anonymity in continuous location-based services. In: Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems, p.\u00a039. ACM 2007.","DOI":"10.1145\/1341012.1341062"},{"key":"478_CR22","doi-asserted-by":"crossref","unstructured":"Y. Wang, L.p. He, J. Peng, T.t. Zhang, H.z. Li, Privacy preserving for continuous query in location based services. In: IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS), 2012, pp. 213\u2013220. IEEE 2012.","DOI":"10.1109\/ICPADS.2012.38"},{"issue":"05","key":"478_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 10, No. 05, pp. 557\u2013570, 2002.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"478_CR24","doi-asserted-by":"crossref","unstructured":"Y.H. Gustav, Y. Wang, M.K. Domenic, F. Zhang, I. Memon, Velocity similarity anonymization for continuous query location based services. In: 2013 International conference on computational problem-solving (ICCP), (pp. 433\u2013436. IEEE 2013).","DOI":"10.1109\/ICCPS.2013.6893578"},{"key":"478_CR25","doi-asserted-by":"crossref","unstructured":"G. Ghinita, M.L. Damiani, C. Silvestri, E. Bertino, Preventing velocity-based linkage attacks in location-aware applications. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (pp. 246\u2013255. ACM 2009).","DOI":"10.1145\/1653771.1653807"},{"key":"478_CR26","unstructured":"F. Liu, K.A. Hua, Y. Cai, Query l-diversity in location-based services. In: MDM\u201909. Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009, (pp. 436\u2013442. IEEE, 2009)."},{"key":"478_CR27","unstructured":"L. Stenneth, S.Y. Phillip, O. Wolfson, Mobile systems location privacy:\u201cmobipriv\u201d a robust k anonymous system. In: IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2010, pp. 54\u201363. IEEE 2010."},{"issue":"3","key":"478_CR28","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10707-010-0117-0","volume":"15","author":"CY Chow","year":"2011","unstructured":"C. Y. Chow, M. F. Mokbel, J. Bao and X. Liu, Query-aware location anonymization for road networks, GeoInformatica, Vol. 15, No. 3, pp. 571\u2013607, 2011.","journal-title":"GeoInformatica"},{"key":"478_CR29","doi-asserted-by":"crossref","unstructured":"H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services. In: ICPS\u201905 Proceedings International Conference on Pervasive Services, 2005, (pp. 88\u201397. IEEE, 2005).","DOI":"10.1109\/ICDE.2005.269"},{"key":"478_CR30","doi-asserted-by":"crossref","unstructured":"T.H. You, W.C. Peng, W.C. Lee, Protecting moving trajectories with dummies. In: International Conference on Mobile Data Management, 2007, pp. 278\u2013282. IEEE 2007.","DOI":"10.1109\/MDM.2007.58"},{"key":"478_CR31","doi-asserted-by":"crossref","unstructured":"C.Y. Chow, M. Mokbel, Enabling private continuous queries for revealed user locations. Advances in Spatial and Temporal Databases (pp. 258\u2013275, 2007).","DOI":"10.1007\/978-3-540-73540-3_15"},{"issue":"2","key":"478_CR32","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"T. Brinkhoff, A framework for generating network-based moving objects, GeoInformatica, Vol. 6, No. 2, pp. 153\u2013180, 2002.","journal-title":"GeoInformatica"},{"key":"478_CR33","doi-asserted-by":"crossref","unstructured":"L. Stenneth, P. Yu, Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), pp. 1\u201310. IEEE 2010.","DOI":"10.4108\/icst.collaboratecom.2010.8"},{"key":"478_CR34","doi-asserted-by":"crossref","unstructured":"X. Pan, X. Meng, J. Xu, Distortion-based anonymity for continuous queries in location-based mobile services. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 256\u2013265. ACM 2009.","DOI":"10.1145\/1653771.1653808"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-020-00478-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-020-00478-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-020-00478-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T01:03:52Z","timestamp":1611363832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-020-00478-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,24]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["478"],"URL":"https:\/\/doi.org\/10.1007\/s10776-020-00478-4","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2020,1,24]]},"assertion":[{"value":"5 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}