{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:42:27Z","timestamp":1649065347732},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"S3","license":[{"start":{"date-parts":[[2015,12,12]],"date-time":"2015-12-12T00:00:00Z","timestamp":1449878400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"2016 Anhui provincial colleges and universities outstanding young talent support program key projects","award":["2016"],"award-info":[{"award-number":["2016"]}]},{"name":"Universities Key Fund of Anhui Province for Young Talents of China","award":["2013SQRL082ZD"],"award-info":[{"award-number":["2013SQRL082ZD"]}]},{"name":"Natural Science Research Universities Key Project of Anhui Province of China","award":["KJ2014A256"],"award-info":[{"award-number":["KJ2014A256"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s13198-015-0406-y","type":"journal-article","created":{"date-parts":[[2015,12,12]],"date-time":"2015-12-12T15:28:41Z","timestamp":1449934121000},"page":"1961-1965","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Road segment hiding algorithm of preventing replay attack under road network environment"],"prefix":"10.1007","volume":"8","author":[{"given":"Wen","family":"Chen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"issue":"2","key":"406_CR1","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff T (2002) A framework for generating network-based moving objects. GeoInformatica 6(2):153\u2013180","journal-title":"GeoInformatica"},{"key":"406_CR2","unstructured":"Chow CY, Mokbel MF, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. VLDB Endowment, pp 763\u2013774"},{"issue":"3","key":"406_CR3","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s10707-010-0117-0","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow CY, Mokbel MF, Bao J et al (2011) Query-aware location anonymization for road networks. GeoInformatica 15(3):571\u2013607","journal-title":"GeoInformatica"},{"key":"406_CR4","doi-asserted-by":"crossref","unstructured":"Gedik B, Liu L (2005) Location privacy in mobile systems: a personalized anonymization model. In: The 25th IEEE international conference on distributed computing systems (ICDCS), pp 620\u2013629","DOI":"10.1109\/ICDCS.2005.48"},{"issue":"2","key":"406_CR5","first-page":"1719","volume":"19","author":"G Ghinita","year":"2007","unstructured":"Ghinita G, Kalnis P, Mouratidis K, Papadias D (2007a) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(2):1719\u20131733","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"406_CR6","doi-asserted-by":"crossref","unstructured":"Ghinita G, Kalnis P, Skiadopoulos S (2007) Prive: anonymous location-based queries in distributed mobile systems. In: 16th international conference on world wide web, ACM pp 371\u2013380","DOI":"10.1145\/1242572.1242623"},{"key":"406_CR7","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services. ACM, pp 31\u201342","DOI":"10.1145\/1066116.1189037"},{"key":"406_CR8","doi-asserted-by":"crossref","unstructured":"Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: 05\u2032 International conference on pervasive services, pp 88\u201397","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"406_CR9","unstructured":"LIN, LIT (2007) t-closeness: privacy beyond K-anonymity and l-diversity. In: 23rd International conference on data engineering, Istanbul, Turkey, pp 106\u2013115"},{"issue":"1","key":"406_CR10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J et al (2007) l-Diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1):3","journal-title":"ACM Trans Knowl Discov Data"},{"key":"406_CR11","doi-asserted-by":"crossref","unstructured":"Mokbel MF (2006) Towards privacy-aware location-based database servers. In: 22nd international conference on data engineering workshops","DOI":"10.1109\/ICDEW.2006.152"},{"key":"406_CR12","doi-asserted-by":"crossref","unstructured":"Sun Lan (2013) Location privacy protection algorithm for preventing replay attack in road networks. J Huazhong Univ Sci Tech","DOI":"10.1109\/ICCSE.2012.6295193"},{"issue":"05","key":"406_CR13","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"issue":"1","key":"406_CR14","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.14778\/1687627.1687745","volume":"2","author":"T Wang","year":"2009","unstructured":"Wang T, Liu L (2009) Privacy-aware mobile services over road networks. Proc VLDB Endowment 2(1):1042\u20131053","journal-title":"Proc VLDB Endowment"},{"key":"406_CR15","first-page":"429","volume":"45","author":"J Xu","year":"2011","unstructured":"Xu J (2011) Location privacy protection through anonymous cells in road network. J Zhe Univ 45:429\u2013434","journal-title":"J Zhe Univ"},{"key":"406_CR16","doi-asserted-by":"crossref","first-page":"865","DOI":"10.3724\/SP.J.1016.2011.00865","volume":"34","author":"J Xue","year":"2011","unstructured":"Xue J (2011) A location privacy preserving approach on road network. Chin J Comput 34:865\u2013878","journal-title":"Chin J Comput"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0406-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-015-0406-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0406-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0406-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T11:43:47Z","timestamp":1567424627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-015-0406-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,12]]},"references-count":16,"journal-issue":{"issue":"S3","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["406"],"URL":"https:\/\/doi.org\/10.1007\/s13198-015-0406-y","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,12]]}}}