{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:42Z","timestamp":1740122622174,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07604-8","type":"journal-article","created":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T20:06:58Z","timestamp":1592597218000},"page":"929-947","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PPSTS: Privacy Preservation in Geographical Data by Spatio-Temporal Shifting Using Elliptic Curve Cryptography"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8070-1717","authenticated-orcid":false,"given":"Nikhil B.","family":"Khandare","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,19]]},"reference":[{"key":"7604_CR1","volume-title":"Geographic information systems and science","author":"PA Longley","year":"2005","unstructured":"Longley, P. A., et al. (2005). Geographic information systems and science. New York: Wiley."},{"key":"7604_CR2","doi-asserted-by":"crossref","DOI":"10.4324\/9780203484029","volume-title":"Elliptic curves: Number theory and cryptography","author":"LC Washington","year":"2003","unstructured":"Washington, L. C. (2003). Elliptic curves: Number theory and cryptography. New York: Chapman and Hall\/CRC."},{"issue":"1","key":"7604_CR3","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"KM Chandy","year":"1985","unstructured":"Chandy, K. M., & Lamport, L. (1985). Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems (TOCS), 3(1), 63\u201375.","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"7604_CR4","volume-title":"Cryptography and network security, 4\/E","author":"W Stallings","year":"2006","unstructured":"Stallings, W. (2006). Cryptography and network security, 4\/E. Bengaluru: Pearson Education India."},{"issue":"6","key":"7604_CR5","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"Whitfield Diffie","year":"1976","unstructured":"Diffie, Whitfield, & Hellman, Martin. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"177","key":"7604_CR6","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"Neal Koblitz","year":"1987","unstructured":"Koblitz, Neal. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203\u2013209.","journal-title":"Mathematics of computation"},{"key":"7604_CR7","unstructured":"Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques. Berlin: Springer."},{"issue":"3","key":"7604_CR8","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1007\/s11277-016-3393-7","volume":"90","author":"S Ray","year":"2016","unstructured":"Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications, 90(3), 1331\u20131354.","journal-title":"Wireless Personal Communications"},{"issue":"7","key":"7604_CR9","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"Leslie Lamport","year":"1978","unstructured":"Lamport, Leslie. (1978). Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7), 558\u2013565.","journal-title":"Communications of the ACM"},{"key":"7604_CR10","doi-asserted-by":"crossref","unstructured":"Niu, B., et al. (2015). Enhancing privacy through caching in location-based services. In 2015 IEEE conference on computer communications (INFOCOM). IEEE.","DOI":"10.1109\/INFOCOM.2015.7218474"},{"issue":"1","key":"7604_CR11","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/JSYST.2014.2354235","volume":"11","author":"Tao Peng","year":"2017","unstructured":"Peng, Tao, Liu, Qin, & Wang, Guojun. (2017). Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 11(1), 219\u2013230.","journal-title":"IEEE Systems Journal"},{"key":"7604_CR12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jnca.2016.10.011","volume":"89","author":"G Sun","year":"2017","unstructured":"Sun, G., et al. (2017). Efficient location privacy algorithm for Internet of Things (IoT) services and applications. Journal of Network and Computer Applications, 89, 3\u201313.","journal-title":"Journal of Network and Computer Applications"},{"key":"7604_CR13","doi-asserted-by":"crossref","unstructured":"Liang, Y., et al. (2017). Location privacy leakage through sensory data. In Security and communication networks.","DOI":"10.1155\/2017\/7576307"},{"key":"7604_CR14","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.future.2016.08.023","volume":"74","author":"G Sun","year":"2017","unstructured":"Sun, G., et al. (2017). L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 74, 375\u2013384.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"7604_CR15","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1007\/s11277-015-2300-y","volume":"82","author":"Imran Memon","year":"2015","unstructured":"Memon, Imran. (2015). Authentication user\u2019s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585\u20131600.","journal-title":"Wireless Personal Communications"},{"key":"7604_CR16","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.jnca.2016.11.024","volume":"86","author":"G Sun","year":"2017","unstructured":"Sun, G., et al. (2017). User-defined privacy location-sharing system in mobile online social networks. Journal of Network and Computer Applications, 86, 34\u201345.","journal-title":"Journal of Network and Computer Applications"},{"issue":"9","key":"7604_CR17","doi-asserted-by":"crossref","first-page":"2658","DOI":"10.1109\/TITS.2015.2506579","volume":"17","author":"George P Corser","year":"2016","unstructured":"Corser, George P., Huirong, Fu, & Banihani, Abdelnasser. (2016). Evaluating location privacy in vehicular communications and applications. IEEE Transactions on Intelligent Transportation Systems, 17(9), 2658\u20132667.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"12","key":"7604_CR18","doi-asserted-by":"crossref","first-page":"1866","DOI":"10.14778\/3352063.3352086","volume":"12","author":"Y Cao","year":"2019","unstructured":"Cao, Y., et al. (2019). PriSTE: Protecting spatiotemporal event privacy in continuous location-based services. Proceedings of the VLDB Endowment, 12(12), 1866\u20131869.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"7604_CR19","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.future.2018.11.046","volume":"94","author":"M Yang","year":"2019","unstructured":"Yang, M., et al. (2019). A blockchain-based location privacy-preserving crowdsensing system. Future Generation Computer Systems, 94, 408\u2013418.","journal-title":"Future Generation Computer Systems"},{"key":"7604_CR20","doi-asserted-by":"crossref","unstructured":"Cao, Y., et al. (2020). PANDA: Policy-aware location privacy for epidemic surveillance. arXiv preprint arXiv:2005.00186.","DOI":"10.14778\/3415478.3415529"},{"key":"7604_CR21","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TIFS.2019.2928205","volume":"15","author":"J Kang","year":"2019","unstructured":"Kang, J., et al. (2019). MoveWithMe: Location privacy preservation for smartphone users. IEEE Transactions on Information Forensics and Security, 15, 711\u2013724.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7604_CR22","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.future.2018.10.025","volume":"93","author":"T Peng","year":"2019","unstructured":"Peng, T., et al. (2019). Multidimensional privacy preservation in location-based services. Future Generation Computer Systems, 93, 312\u2013326.","journal-title":"Future Generation Computer Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07604-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07604-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07604-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T23:56:30Z","timestamp":1624060590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07604-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7604"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07604-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,6,19]]},"assertion":[{"value":"19 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}