{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:02:20Z","timestamp":1725472940177},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883412","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"768-774","source":"Crossref","is-referenced-by-count":5,"title":["Collusion-resistant query anonymization for location-based services"],"prefix":"10.1109","author":[{"given":"Qin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Loukas","family":"Lazos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"15","first-page":"552","article-title":"How to leak a secret","author":"rivest","year":"2001","journal-title":"Advances in Cryptology Asiacrypt"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008304703074"},{"key":"13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","article-title":"Anonymity, unobservability, and pseudonymity: A proposal for terminology","author":"pfitzmann","year":"2001","journal-title":"Designing Privacy Enhancing Technologies"},{"key":"14","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/BFb0052348","article-title":"All-or-nothing encryption and the package transform","author":"rivest","year":"1997","journal-title":"Fast Software Encryption"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2010.5534928"},{"key":"12","first-page":"763","article-title":"The new Casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"Proc of the VLDB Conference"},{"key":"3","first-page":"257","article-title":"Group signatures","author":"chaum","year":"1991","journal-title":"Proc of the EuroCrypt Conference"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9254-0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-009-0099-y"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.56"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883412.pdf?arnumber=6883412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T12:43:52Z","timestamp":1565786632000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883412","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}