{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:22:52Z","timestamp":1730215372243,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/dyspan.2018.8610485","type":"proceedings-article","created":{"date-parts":[[2019,1,15]],"date-time":"2019-01-15T08:53:04Z","timestamp":1547542384000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access"],"prefix":"10.1109","author":[{"given":"Ahmed M.","family":"Salama","sequence":"first","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Loukas","family":"Lazos","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Marwan","family":"Krunz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.855610"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1049\/ip-g-1.1981.0008"},{"article-title":"Handbook of probability and statistics with tables","year":"1970","author":"burington","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127698"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2262679"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0025-5564(70)90061-1"},{"journal-title":"Nonlinear Programming","year":"1999","author":"bertsekas","key":"ref13"},{"journal-title":"Decomposition Techniques in Mathematical Programming Engineering and Science Applications","year":"2006","author":"conejo","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2693965"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.241"},{"key":"ref17","article-title":"Docket no. 08-260","author":"fcc","year":"2008","journal-title":"Second Report and Order and Memorandum Opinion and Order"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/35.339880"},{"journal-title":"Microsoft white spaces database","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.17"},{"journal-title":"Google Spectrum Data Base","year":"2013","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2014.6817800"},{"journal-title":"Poisson Processes","year":"1993","author":"kingman","key":"ref29"},{"key":"ref5","article-title":"Enabling innovative small cell use in 3.5 ghz band nprm & order","volume":"148","author":"commission","year":"2012","journal-title":"FCCM'12"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11428572_10","article-title":"A formal model of obfuscation and negotiation for location privacy","author":"duckham","year":"2005","journal-title":"International Conference on Pervasive Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"journal-title":"White Space Database Administration","year":"2016","author":"commission","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249548"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/155014773794582"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.322"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288403"}],"event":{"name":"2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","start":{"date-parts":[[2018,10,22]]},"location":"Seoul","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8603843\/8610401\/08610485.pdf?arnumber=8610485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:18:29Z","timestamp":1643159909000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8610485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/dyspan.2018.8610485","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}