{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:28:44Z","timestamp":1761611324556},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,3]],"date-time":"2013-05-03T00:00:00Z","timestamp":1367539200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11704-013-2020-y","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T22:52:52Z","timestamp":1367535172000},"page":"317-340","source":"Crossref","is-referenced-by-count":12,"title":["Preserving location privacy without exact locations in mobile services"],"prefix":"10.1007","volume":"7","author":[{"given":"Xiao","family":"Pan","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"2020_CR1","first-page":"9","volume-title":"Location-based Services","author":"J Schiller","year":"2004","unstructured":"Schiller J, Voisard A. General aspects of location-based services. In: Location-based Services. 2004, 9\u201326"},{"issue":"1","key":"2020_CR2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MTAS.2003.1188276","volume":"22","author":"J Dobson","year":"2003","unstructured":"Dobson J, Fisher P. Geoslavery. IEEE Technology and Society Magazine, 2003, 22(1): 47\u201352","journal-title":"IEEE Technology and Society Magazine"},{"key":"2020_CR3","unstructured":"Privacy please! U.S. smartphone app users concerned with privacy. http:\/\/blog.nielsen.com\/nielsenwire\/online_mobile\/privacy-please-ussmartphone-app-users-concerned-with-privacy-when-it-comes-tolocation"},{"issue":"5","key":"2020_CR4","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557\u2013570","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"2020_CR5","first-page":"1429","volume-title":"Proceedings of the 33rd International Conference on Very Large Data Bases","author":"L Liu","year":"2007","unstructured":"Liu L. From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Data Bases. 2007, 1429\u20131430"},{"key":"2020_CR6","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"Proceedings of the 1st International Conference on Mobile Systems, Applications and Services","author":"M Gruteser","year":"2003","unstructured":"Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. 2003, 31\u201342"},{"key":"2020_CR7","first-page":"763","volume-title":"Proceedings of the 32nd International Conference on Very Large Data Bases","author":"M Mokbel","year":"2006","unstructured":"Mokbel M, Chow C, Aref W. The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases. 2006, 763\u2013774"},{"key":"2020_CR8","first-page":"434","volume-title":"Proceedings of the 12th International Conference on Database Systems for Advanced Applications","author":"Z Xiao","year":"2007","unstructured":"Xiao Z, Meng X, Xu J. Quality aware privacy protection for location-based services. In: Proceedings of the 12th International Conference on Database Systems for Advanced Applications. 2007, 434\u2013446"},{"key":"2020_CR9","first-page":"39","volume-title":"Proceedings of the 15th annual ACM International Symposium on Advances in Geographic Information Systems","author":"T Xu","year":"2007","unstructured":"Xu T, Cai Y. Location anonymity in continuous location-based services. In: Proceedings of the 15th annual ACM International Symposium on Advances in Geographic Information Systems. 2007, 39\u201347"},{"key":"2020_CR10","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1145\/1653771.1653808","volume-title":"Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems","author":"X Pan","year":"2009","unstructured":"Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. 2009, 256\u2013265"},{"issue":"1","key":"2020_CR11","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TKDE.2006.15","volume":"18","author":"H Hu","year":"2006","unstructured":"Hu H, Lee D. Range nearest-neighbor query. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 78\u201391","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2020_CR12","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1376616.1376631","volume-title":"Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data","author":"G Ghinita","year":"2008","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K. Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. 2008, 121\u2013132"},{"key":"2020_CR13","first-page":"620","volume-title":"Proceedings of the 25th IEEE International Conference on Distributed Computing Systems","author":"B Gedik","year":"2005","unstructured":"Gedik B, Liu L. Location privacy in mobile systems: a personalized anonymization model. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. 2005, 620\u2013629"},{"key":"2020_CR14","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1145\/1242572.1242623","volume-title":"Proceedings of the 16th International Conference on World Wide Web","author":"G Ghinita","year":"2007","unstructured":"Ghinita G, Kalnis P, Skiadopoulos S. PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web. 2007, 371\u2013380"},{"key":"2020_CR15","first-page":"1120","volume-title":"Proceedings of the 25th IEEE International Conference on Data Engineering","author":"H Hu","year":"2009","unstructured":"Hu H, Xu J. Non-exposure location anonymity. In: Proceedings of the 25th IEEE International Conference on Data Engineering. 2009, 1120\u20131131"},{"key":"2020_CR16","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/967900.968021","volume-title":"Proceedings of the 2004 ACM Symposium on Applied Computing","author":"C Ding","year":"2004","unstructured":"Ding C, He X. K-nearest-neighbor consistency in data clustering: incorporating local information into global optimization. In: Proceedings of the 2004 ACM Symposium on Applied Computing. 2004, 584\u2013589"},{"key":"2020_CR17","unstructured":"Thomas brinkhoff network-based generator of moving objects. http:\/\/www.fhoow.de\/institute\/iapg\/personen\/brinkhoff"},{"key":"2020_CR18","unstructured":"Athens trucks data. http:\/\/www.rtreeportal.org\/"},{"key":"2020_CR19","first-page":"211","volume-title":"Proceedings of the 9th International Conference on Mobile Data Management","author":"Y Zheng","year":"2008","unstructured":"Zheng Y, Wang L, Zhang R, Xie X, Ma W. Geolife: managing and understanding your past life over maps. In: Proceedings of the 9th International Conference on Mobile Data Management. 2008, 211\u2013212"},{"key":"2020_CR20","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Proceedings of the 6th International Conference on Privacy Enhancing Technologies","author":"R Cheng","year":"2006","unstructured":"Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In: Proceedings of the 6th International Conference on Privacy Enhancing Technologies. 2006, 393\u2013412"},{"key":"2020_CR21","first-page":"366","volume-title":"Proceedings of the IEEE 24th International Conference on Data Engineering","author":"M Yiu","year":"2008","unstructured":"Yiu M, Jensen C, Huang X, Lu H. Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: Proceedings of the IEEE 24th International Conference on Data Engineering. 2008, 366\u2013375"},{"key":"2020_CR22","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases","author":"C Chow","year":"2007","unstructured":"Chow C, Mokbel M. Enabling private continuous queries for revealed user locations. In: Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases. 2007, 258\u2013273"},{"issue":"1","key":"2020_CR23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1882471.1882473","volume":"12","author":"A Gkoulalas-Divanis","year":"2010","unstructured":"Gkoulalas-Divanis A, Kalnis P, Verykios V. Providing k-anonymity in location based services. ACM SIGKDD Explorations Newsletter, 2010, 12(1): 3\u201310","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"2020_CR24","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-540-73540-3_13","volume-title":"Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases","author":"G Ghinita","year":"2007","unstructured":"Ghinita G, Kalnis P, Skiadopoulos S. MOBIHIDE: a mobilea peer-topeer system for anonymous location-based queries. In: Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases. 2007, 221\u2013238"},{"key":"2020_CR25","first-page":"372","volume-title":"Proceedings of the 9th International Conference on Ubiquitous Computing","author":"T Hashem","year":"2007","unstructured":"Hashem T, Kulik L. Safeguarding location privacy in wireless ad-hoc networks. In: Proceedings of the 9th International Conference on Ubiquitous Computing. 2007, 372\u2013390"},{"key":"2020_CR26","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","volume-title":"Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases","author":"A Khoshgozaran","year":"2007","unstructured":"Khoshgozaran A, Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases. 2007, 239\u2013257"},{"issue":"3","key":"2020_CR27","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10115-010-0286-z","volume":"26","author":"A Khoshgozaran","year":"2011","unstructured":"Khoshgozaran A, Shahabi C, Shirani-Mehr H. Location privacy: going beyond k-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 2011, 26(3): 435\u2013465","journal-title":"Knowledge and Information Systems"},{"key":"2020_CR28","doi-asserted-by":"crossref","first-page":"1248","DOI":"10.1109\/ICDE.2005.269","volume-title":"Proceedings of the 21st International Conference on Data Engineering Workshops","author":"H Kido","year":"2005","unstructured":"Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services. In: Proceedings of the 21st International Conference on Data Engineering Workshops. 2005, 1248"},{"key":"2020_CR29","first-page":"376","volume-title":"Proceedings of the IEEE 24th International Conference on Data Engineering","author":"O Abul","year":"2008","unstructured":"Abul O, Bonchi F, Nanni M. Never walk alone: uncertainty for anonymity in moving objects databases. In: Proceedings of the IEEE 24th International Conference on Data Engineering. 2008, 376\u2013385"},{"key":"2020_CR30","first-page":"65","volume-title":"Proceedings of the International Conference on Mobile Data Management","author":"M Terrovitis","year":"2008","unstructured":"Terrovitis M, Mamoulis N. Privacy preserving in the publication of trajectories. In: Proceedings of the International Conference on Mobile Data Management. 2008, 65\u201372"},{"key":"2020_CR31","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1145\/1516360.1516370","volume-title":"Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology","author":"R Yarovoy","year":"2009","unstructured":"Yarovoy R, Bonchi F, Lakshmanan L, Wang W. Anonymizing moving objects: how to hide aMOB in a crowd? In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. 2009, 72\u201383"},{"key":"2020_CR32","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1145\/1645953.1646140","volume-title":"Proceedings of the 18th ACM Conference on Information and Knowledge Management","author":"N Mohammed","year":"2009","unstructured":"Mohammed N, Fung B, Debbabi M.Walking in the crowd: anonymizing trajectory data for pattern analysis. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management. 2009, 1441\u20131444"},{"issue":"8","key":"2020_CR33","doi-asserted-by":"crossref","first-page":"606","DOI":"10.4304\/jcm.7.8.606-621","volume":"7","author":"L Becchetti","year":"2012","unstructured":"Becchetti L, Filipponi L, Vitaletti A. Privacy support in people-centric sensing. Journal of Communications, 2012, 7(8): 606\u2013621","journal-title":"Journal of Communications"},{"issue":"10","key":"2020_CR34","doi-asserted-by":"crossref","first-page":"1820","DOI":"10.3724\/SP.J.1016.2011.01820","volume":"34","author":"Z Huo","year":"2011","unstructured":"Huo Z, Meng X. A survey of trajectory privacy-preserving techniques. Chinese Journal of Computers, 2011, 34(10): 1820\u20131830","journal-title":"Chinese Journal of Computers"},{"key":"2020_CR35","volume-title":"A study of several specific secure two-party computation problems","author":"WJ Du","year":"2001","unstructured":"Du WJ. A study of several specific secure two-party computation problems. PhD thesis. Purdue University, 2001"},{"issue":"1","key":"2020_CR36","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A Beresford","year":"2003","unstructured":"Beresford A, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1): 46\u201355","journal-title":"IEEE Pervasive Computing"},{"key":"2020_CR37","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-540-69497-7_9","volume-title":"Proceedings of the 20th International Conference on Scientific and Statistical Database Management","author":"B Krishnamachari","year":"2008","unstructured":"Krishnamachari B, Ghinita G, Kalnis P. Privacy-preserving publication of user locations in the proximity of sensitive sites. In: Proceedings of the 20th International Conference on Scientific and Statistical Database Management. 2008, 95\u2013113"},{"issue":"3","key":"2020_CR38","first-page":"18","volume":"35","author":"H Hu","year":"2010","unstructured":"Hu H, Xu J, On S, Du J, Ng J. Privacy-aware location data publishing. ACM Transactions on Database Systems, 2010, 35(3): 18\u201359","journal-title":"ACM Transactions on Database Systems"},{"key":"2020_CR39","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases","author":"C Chow","year":"2007","unstructured":"Chow C, Mokbel M. Enabling private continuous queries for revealed user locations. In: Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases. 2007, 258\u2013273"},{"key":"2020_CR40","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/0304-3975(76)90059-1","volume":"1","author":"M Garey","year":"1976","unstructured":"Garey M, Johnson D, Stockmeyer L. Some simplified np-complete graph problem. Theoretical Computer Science, 1976, (1): 237\u2013267","journal-title":"Theoretical Computer Science"},{"key":"2020_CR41","first-page":"191","volume-title":"Introduction Graph Theory","author":"G Chartrand","year":"1997","unstructured":"Chartrand G. Planar graphs and coloring problems. In: Introduction Graph Theory. 1997, 191\u2013209"},{"issue":"1","key":"2020_CR42","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1093\/comjnl\/10.1.85","volume":"10","author":"D Welsh","year":"1967","unstructured":"Welsh D, Powell M. An upper bound for the chromatic number of a graph and its application to timetabling problems. The Computer Journal, 1967, 10(1): 85\u201386","journal-title":"The Computer Journal"},{"issue":"2","key":"2020_CR43","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/s11390-008-9121-3","volume":"23","author":"G Loukides","year":"2008","unstructured":"Loukides G, Shao J. An efficient clustering algorithm for kanonymisation. Journal of Computer Science and Technology, 2008, 23(2): 188\u2013202","journal-title":"Journal of Computer Science and Technology"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-2020-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-013-2020-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-2020-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T21:48:38Z","timestamp":1644961718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-013-2020-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,3]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["2020"],"URL":"https:\/\/doi.org\/10.1007\/s11704-013-2020-y","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,3]]}}}