{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:23Z","timestamp":1759331843541},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883667","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"2307-2312","source":"Crossref","is-referenced-by-count":11,"title":["Using dynamic pseudo-IDs to protect privacy in location-based services"],"prefix":"10.1109","author":[{"given":"Xiaoyan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Haotian","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Shunrong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiaosan","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.145"},{"key":"15","article-title":"A unified framework for location privacy","author":"shokri","year":"2010","journal-title":"3rd Hot Topics in Privacy Enhancing Technologies (HotPETs)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"key":"13","article-title":"Deanonymizing mobility traces: Using social network as a side-channel","author":"mudhakar srivatsa","year":"2012","journal-title":"ACM CCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_3"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860017"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73538-0_4","article-title":"Location privacy protection through obfuscation-based techniques","author":"ardagna","year":"2007","journal-title":"Data and Applications Security XXII"},{"key":"2","article-title":"A formal model of obfuscation and negotiation for location privacy","author":"duckham","year":"2005","journal-title":"ACM PERVASIVE"},{"key":"1","first-page":"2159","article-title":"Inferring long-term user properties based on users' location history","author":"matsuo","year":"2007","journal-title":"IJCAI"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"6","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"ACM VLDB"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.79"},{"key":"9","article-title":"Mobicache: When k-anonymity meets cache","author":"zhu","year":"2013","journal-title":"IEEE GLOBECOM"},{"key":"8","article-title":"3plus: Privacy-preserving pseudolocation updating system in location-based services","author":"niu","year":"2013","journal-title":"IEEE WCNC"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883667.pdf?arnumber=6883667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:50:09Z","timestamp":1498146609000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883667","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}