{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:57:11Z","timestamp":1725782231111},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/icccn.2014.6911813","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:26:58Z","timestamp":1412094418000},"page":"1-8","source":"Crossref","is-referenced-by-count":23,"title":["A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services"],"prefix":"10.1109","author":[{"given":"Ben","family":"Niu","sequence":"first","affiliation":[]},{"given":"Qinghua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934991"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883443"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831174"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653692"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-009-0099-y"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831391"},{"key":"20","article-title":"3plus: Privacy-preserving pseudolocation updating system in location-based services","author":"niu","year":"2013","journal-title":"Proc of IEEE WCNC"},{"key":"22","article-title":"Protecting location privacy through path confusion","author":"hoh","year":"2005","journal-title":"Proc of IEEE Securecomm"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567110"},{"year":"0","key":"25"},{"key":"26","article-title":"Privacy in mobile computing for location-sharing-based services","author":"bilogrevic","year":"2011","journal-title":"Proc of ACM PETS"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.29"},{"key":"28","article-title":"Mobihide: A mobilea peerto-peer system for anonymous location-based queries","author":"ghinita","year":"2007","journal-title":"Proc of ACM SSTD"},{"journal-title":"Route Choice Analysis Data Models Algorithms and Applications","year":"2008","author":"frejinger","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"10","article-title":"Cap: A contextaware privacy protection system for location-based services","author":"pingley","year":"2009","journal-title":"Proc of IEEE ICDCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.145"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245379"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620591"},{"key":"32","article-title":"Towards an information theoretic metric for anonymity","author":"serjantov","year":"2003","journal-title":"Proc of ACM PETS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061995"},{"key":"4","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"Proc ACM VLDB"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1626536.1626540"},{"key":"8","article-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service","author":"chow","year":"2006","journal-title":"Proc of ACM GIS"}],"event":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2014,8,4]]},"location":"China","end":{"date-parts":[[2014,8,7]]}},"container-title":["2014 23rd International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6901364\/6911704\/06911813.pdf?arnumber=6911813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:04:20Z","timestamp":1490292260000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icccn.2014.6911813","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}