{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T23:41:44Z","timestamp":1747179704149,"version":"3.40.5"},"reference-count":52,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Location Based Services"],"published-print":{"date-parts":[[2022,1,2]]},"DOI":"10.1080\/17489725.2021.1906965","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T05:16:25Z","timestamp":1618204585000},"page":"25-53","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Privacy preserved spatio-temporal trajectory publication of Covid-19 patients"],"prefix":"10.1080","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0542-6994","authenticated-orcid":false,"given":"Rajesh","family":"N","sequence":"first","affiliation":[{"name":"School of Computer Sciences, Mahatma Gandhi University, Kottayam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7212-7455","authenticated-orcid":false,"given":"Sajimon","family":"Abraham","sequence":"additional","affiliation":[{"name":"School of Management & Business Studies, Mahatma Gandhi University, Kottayam, India"}]},{"given":"Shyni S.","family":"Das","sequence":"additional","affiliation":[{"name":"Department of Computer Science, S.A.S. S.N.D.P. Yogam College, Konni, India"}]}],"member":"301","published-online":{"date-parts":[[2021,4,11]]},"reference":[{"key":"cit0001","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/ICDE.2008.4497446","volume-title":"2008 IEEE 24th International Conference on Data Engineering","author":"Abul O.","year":"2008"},{"issue":"1","key":"cit0002","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1186\/s13638-019-1458-5","volume":"2019","author":"Akhtar R.","year":"2019","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"5","key":"cit0003","doi-asserted-by":"crossref","first-page":"5563","DOI":"10.1007\/s11042-017-4469-4","volume":"77","author":"Arain Q. A.","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"cit0004","unstructured":"Bell, J., D. Butler, C. Hicks, and J. Crowcroft. 2020. \u201cTraceSecure: Towards Privacy Preserving Contact Tracing.\u201d ArXiv200404059 Cs."},{"issue":"1","key":"cit0005","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/2031331.2031336","volume":"13","author":"Bonchi F.","year":"2011","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"cit0006","first-page":"1","volume-title":"Encyclopedia of Database Systems","author":"Bridwell S. A.","year":"2016"},{"key":"cit0007","first-page":"83","volume":"231","author":"Chen R.","year":"2013","journal-title":"Information Science in Data Mining for Information Security"},{"key":"cit0008","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-73540-3_15","volume-title":"Advances in Spatial and Temporal Databases","author":"Chow C. -Y.","year":"2007"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031335"},{"issue":"4","key":"cit0010","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1007\/s11280-017-0489-2","volume":"21","author":"Dai Y.","year":"2018","journal-title":"World Wide Web"},{"key":"cit0011","unstructured":"De Carli, A., M. Franco, A. Gassmann, C. Killer, B. Rodrigues, E. Scheid, D. Schoenbaechler, and B. Stiller. 2020. \u201cWeTrace\u2013 A Privacy-preserving Mobile COVID-19 Tracing Approach and Application.\u201d ArXiv200408812 Cs."},{"key":"cit0012","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1868470.1868478","volume-title":"Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL \u201910","author":"Domingo-Ferrer J.","year":"2010"},{"key":"cit0013","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.knosys.2018.01.007","volume":"148","author":"Dong Y.","year":"2018","journal-title":"Knowledge-Based Systems"},{"key":"cit0014","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.ins.2019.09.035","volume":"527","author":"Eom C. S. \u2013H.","year":"2020","journal-title":"Information Sciences"},{"issue":"8","key":"cit0015","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.jcss.2014.04.024","volume":"80","author":"Gambs S.","year":"2014","journal-title":"Journal of Computer and System Sciences"},{"key":"cit0016","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.knosys.2015.11.007","volume":"94","author":"Ghasemi Komishani E.","year":"2016","journal-title":"Knowledge-Based Systems"},{"key":"cit0017","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1145\/1242572.1242623","volume-title":"Proceedings of the 16th International Conference on World Wide Web, WWW \u201907","author":"Ghinita G.","year":"2007"},{"key":"cit0018","first-page":"1","volume-title":"Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS \u201908","author":"Gid\u00f3falvi G.","year":"2008"},{"key":"cit0019","unstructured":"Gramaglia, M., M. Fiore, A. Tarable, and A. Banchs. 2017. \u201cKt, \u03b5-anonymity: Towards Privacy-Preserving Publishing of Spatiotemporal Trajectory Data.\u201d ArXiv170102243 Cs."},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"issue":"2","key":"cit0021","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","volume":"2","author":"Gruteser M.","year":"2004","journal-title":"IEEE Security & Privacy Magazine"},{"key":"cit0022","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MDM.2015.18","volume-title":"2015 16th IEEE International Conference on Mobile Data Management","author":"Han P.-I.","year":"2015"},{"key":"cit0023","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1016\/j.cose.2018.05.001","volume":"77","author":"Hu Z.","year":"2018","journal-title":"Computers & Security"},{"key":"cit0024","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/978-3-642-29038-1_26","volume-title":"Database Systems for Advanced Applications, Lecture Notes in Computer Science","author":"Huo Z.","year":"2012"},{"key":"cit0025","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1145\/2020408.2020602","volume-title":"Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201911","author":"Lee B.","year":"2011"},{"key":"cit0026","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-030-30952-7_37","volume-title":"Web Information Systems and Applications, Lecture Notes in Computer Science","author":"Liu X.","year":"2019"},{"key":"cit0027","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/NANA.2018.8648724","volume-title":"2018 International Conference on Networking and Network Applications (NaNA)","author":"Liu X.","year":"2018"},{"issue":"4","key":"cit0028","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11235-019-00551-1","volume":"70","author":"Memon I.","year":"2019","journal-title":"Telecommunication Systems"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720921624"},{"key":"cit0030","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1145\/1645953.1646140","volume-title":"Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM \u201909","author":"Mohammed N.","year":"2009"},{"key":"cit0031","first-page":"1","volume-title":"Proceedings of the 26th International Conference on Scientific and Statistical Database Management, SSDBM \u201914","author":"Naghizade E.","year":"2014"},{"key":"cit0032","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1109\/INFOCOM.2014.6848002","volume-title":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications","author":"Niu B.","year":"2014"},{"key":"cit0033","first-page":"165","volume":"7","author":"Poulis G.","year":"2014","journal-title":"Transactions Data Privacy"},{"issue":"3","key":"cit0034","doi-asserted-by":"crossref","first-page":"2772","DOI":"10.1109\/COMST.2018.2873950","volume":"21","author":"Primault V.","year":"2019","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"cit0035","doi-asserted-by":"crossref","first-page":"2576","DOI":"10.1109\/TNSE.2020.3001061","volume":"7","author":"Qu Y.","year":"2020","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"cit0036","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/978-3-319-99771-1_22","volume-title":"Privacy in Statistical Databases, Lecture Notes in Computer Science","author":"Salas J.","year":"2018"},{"key":"cit0037","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/MDM.2010.29","volume-title":"2010 Eleventh International Conference on Mobile Data Management","author":"Shin H.","year":"2010"},{"key":"cit0038","unstructured":"Shukla, M., S. Lodha, G. Shroff, and R. Raskar. 2020. \u201cPrivacy Guidelines for Contact Tracing Applications.\u201d ArXiv200413328 Cs."},{"key":"cit0039","first-page":"1","volume-title":"2012 IEEE International Conference on Fuzzy Systems","author":"Soria-Comas J.","year":"2012"},{"key":"cit0040","doi-asserted-by":"crossref","first-page":"24555","DOI":"10.1109\/ACCESS.2017.2767641","volume":"5","author":"Sui P.","year":"2017","journal-title":"IEEE Access"},{"key":"cit0041","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/1741866.1741873","volume-title":"Proceedings of the Third ACM Conference on Wireless Network Security, WiSec \u201910","author":"Talukder N.","year":"2010"},{"journal-title":"Wireless Networks","year":"2019","author":"Tan R.","key":"cit0042"},{"key":"cit0043","unstructured":"Tang, Q. 2020. \u201cPrivacy-Preserving Contact Tracing: Current Solutions and Open Questions.\u201d ArXiv200406818 Cs."},{"issue":"7","key":"cit0044","doi-asserted-by":"crossref","first-page":"1581","DOI":"10.3390\/s19071581","volume":"19","author":"Tefera M.","year":"2019","journal-title":"Sensors"},{"issue":"7","key":"cit0045","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1109\/TKDE.2017.2675420","volume":"29","author":"Terrovitis M.","year":"2017","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"cit0046","unstructured":"Troncoso, C., M. Payer, J.P. Hubaux, M. Salath\u00e9, J. Larus, E. Bugnion, W. Lueks, et al. 2020. \u201cDecentralized Privacy-Preserving Proximity Tracing.\u201d ArXiv200512273 Cs."},{"issue":"3","key":"cit0047","first-page":"38","volume":"51","author":"Wagner I.","year":"2018","journal-title":"ACM Computing Surveys"},{"key":"cit0048","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.jvcir.2018.12.052","volume":"59","author":"Wang K.","year":"2019","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"cit0049","first-page":"99","volume-title":"Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS \u201910","author":"Yuan J.","year":"2010"},{"key":"cit0050","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1145\/2030613.2030630","volume-title":"Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MobiCom \u201911","author":"Zang H.","year":"2011"},{"key":"cit0051","doi-asserted-by":"crossref","first-page":"105940","DOI":"10.1016\/j.knosys.2020.105940","volume":"198","author":"Zhao X.","year":"2020","journal-title":"Knowledge-Based Systems"},{"issue":"2","key":"cit0052","first-page":"32","volume":"33","author":"Zheng Y.","year":"2010","journal-title":"IEEE Data Engineering Bulletin"}],"container-title":["Journal of Location Based Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17489725.2021.1906965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T04:49:49Z","timestamp":1645591789000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17489725.2021.1906965"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,11]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,2]]}},"alternative-id":["10.1080\/17489725.2021.1906965"],"URL":"https:\/\/doi.org\/10.1080\/17489725.2021.1906965","relation":{},"ISSN":["1748-9725","1748-9733"],"issn-type":[{"type":"print","value":"1748-9725"},{"type":"electronic","value":"1748-9733"}],"subject":[],"published":{"date-parts":[[2021,4,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tlbs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tlbs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-10-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}