{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:34:43Z","timestamp":1730223283128,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/giots.2018.8534577","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T21:38:00Z","timestamp":1542317880000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["NEXUS: Using Geo-fencing Services without revealing your Location"],"prefix":"10.1109","author":[{"given":"Michael","family":"Guldner","sequence":"first","affiliation":[]},{"given":"Torsten","family":"Spieldenner","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Schubotz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108874"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2007-013801"},{"key":"ref30","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref34","first-page":"280","author":"cramer","year":"2001","journal-title":"in International Conference on the Theory and Applications of Cryptographic Techniques"},{"journal-title":"Location based services and location based behavior in a smart city","year":"2016","author":"wang","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2003.1188276"},{"key":"ref13","first-page":"702","article-title":"Location-based services for mobile telephony: a study of users' privacy concerns","volume":"3 citeseer","author":"barkhuus","year":"2003","journal-title":"interactions"},{"key":"ref14","first-page":"35","article-title":"Location privacy and locationaware computing","volume":"3","author":"duckham","year":"2006","journal-title":"Dynamic & Mobile GIS Investigating Change in Space and Time"},{"article-title":"Wireless location privacy:law and policy in the u.s., EU and japanISOC member briefing #15","year":"0","author":"ackerman","key":"ref15"},{"key":"ref16","first-page":"3p","article-title":"Web privacy withP. &#x201D; O'Reilly Media, Inc","author":"cranor","year":"2002"},{"article-title":"IETF working group on geographic location\/privacy","year":"0","author":"bellis","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1145\/1183471.1183500","article-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service","author":"chow","year":"2006","journal-title":"Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems ACM"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2318435"},{"key":"ref4","first-page":"81","article-title":"Exploring millions of footprints in location sharing services","volume":"2011","author":"cheng","year":"2011","journal-title":"ICWSM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_5"},{"key":"ref3","article-title":"Mobile cartography: adaptive visualisation of geographic information on mobile devices. Verlag Dr","author":"reichenbacher","year":"2004","journal-title":"Hut Munchen"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/978-3-642-03964-5_5","article-title":"Personalized location-based recommendation services for tour planning in mobile tourism applications","author":"yu","year":"2009","journal-title":"International Conference on Electronic Commerce and Web Technologies"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2409","DOI":"10.1145\/1978942.1979295","article-title":"I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application","author":"lindqvist","year":"2011","journal-title":"Proceedings of the SIGCHI conference on Human Factors in computing systems ACM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43964-7_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/13683500.2013.868411"},{"journal-title":"Location-Based Services","year":"2004","author":"schiller","key":"ref2"},{"article-title":"Location based services: Adding another dimension to smart cities","year":"0","author":"singh","key":"ref9"},{"key":"ref1","first-page":"66","article-title":"Developing gissupported location-based services","volume":"2 ieee","author":"virrantaus","year":"2001","journal-title":"Web Information Systems Engineering 2001 Proceedings of the Second International Conference on"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"ref22","article-title":"A lightweight approach to managing privacy in location-based services","author":"rodden","year":"0","journal-title":"[Online] Available"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11428572_10","article-title":"A formal model of obfuscation and negotiation for location privacy","author":"duckham","year":"2005","journal-title":"International Conference on Pervasive Computing"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/3-540-44634-6_16","article-title":"Secure multi-party computational geometry","author":"atallah","year":"2001","journal-title":"Workshop on Algorithms and Data Structures"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.04.024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-007-9011-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-005-0258-z"}],"event":{"name":"2018 Global Internet of Things Summit (GIoTS)","start":{"date-parts":[[2018,6,4]]},"location":"Bilbao","end":{"date-parts":[[2018,6,7]]}},"container-title":["2018 Global Internet of Things Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8514818\/8534428\/08534577.pdf?arnumber=8534577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:02:26Z","timestamp":1643216546000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8534577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/giots.2018.8534577","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}