{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:24:22Z","timestamp":1730193862482,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,21]]},"DOI":"10.1109\/acit53391.2021.9677315","type":"proceedings-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T16:26:35Z","timestamp":1642436795000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Location-Based Services Protection via Multi-Layered System"],"prefix":"10.1109","author":[{"given":"Abdul Rahman H","family":"Ali","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.49"},{"key":"ref11","first-page":"68","article-title":"Hiding location information from location-based services. In Mobile Data Management","author":"hengartner","year":"2007","journal-title":"2007 International Conference on"},{"journal-title":"POI&#x2013; Points of Interest","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02982-0_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1183471.1183500"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MWC.2012.6155874","article-title":"Privacy protection for users of location based services","volume":"19","author":"ju","year":"2012","journal-title":"Wireless Communications"},{"journal-title":"Indoor Location-Based Services","year":"0","author":"wermer","key":"ref17"},{"key":"ref18","first-page":"43","author":"miura","year":"0","journal-title":"A Hybrid Method of User Privacy Protection for Location Based Services"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34203-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"journal-title":"Location-Based Services","year":"2004","author":"schiller","key":"ref4"},{"key":"ref27","article-title":"The definition of location services (2002), what is location services from a GIS perspective","author":"koeppel","year":"0","journal-title":"Esri"},{"key":"ref3","first-page":"111","article-title":"Wireless Communications","author":"krishnamurthy","year":"2004","journal-title":"Telegeoinformatics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912774"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_6"},{"journal-title":"Mobile Communication","year":"2003","author":"schiller","key":"ref5"},{"key":"ref8","article-title":"Achieving Efficient Query Privacy for Location Based Services","author":"olumofin","year":"2009","journal-title":"Technical report CACR 2009-22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1341012.1341062"},{"key":"ref2","article-title":"Location-based mobile services: The essentials","author":"dru","year":"2001","journal-title":"Alcatel Telecommunication"},{"key":"ref9","first-page":"763","article-title":"The new Casper: query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"VLDB &#x2019;06 Proceedings of the 32nd international conference on Very large data bases"},{"journal-title":"Technical Report A Survey of Context-Aware Mobile Computing Research","year":"2000","author":"chen","key":"ref1"},{"key":"ref20","first-page":"709","article-title":"Location-Based Services for Mobile Telephony: a Study of Users&#x2019;","author":"barkhaus","year":"2003","journal-title":"Privacy Concerns"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GEOINFORMATICS.2010.5568118"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73408-6_28"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2012.6377730"},{"journal-title":"Location-Based Services-A Database Perspective","year":"0","author":"jensen","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11576259_66"}],"event":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2021,12,21]]},"location":"Muscat, Oman","end":{"date-parts":[[2021,12,23]]}},"container-title":["2021 22nd International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9677036\/9677041\/09677315.pdf?arnumber=9677315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:57:50Z","timestamp":1652187470000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9677315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/acit53391.2021.9677315","relation":{},"subject":[],"published":{"date-parts":[[2021,12,21]]}}}