{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:25:59Z","timestamp":1729610759727,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icccn.2015.7288379","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:06:14Z","timestamp":1444082774000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["AnonAD: Privacy-Aware Micro-Targeted Mobile Advertisements without Proxies"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Buckley","sequence":"first","affiliation":[]},{"given":"Parth H.","family":"Pathak","sequence":"additional","affiliation":[]},{"given":"Aveek K.","family":"Das","sequence":"additional","affiliation":[]},{"given":"Chen-Nee","family":"Chuah","sequence":"additional","affiliation":[]},{"given":"Prasant","family":"Mohapatra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742653"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2009","author":"nakamoto","key":"ref13"},{"journal-title":"Hashcash - a denial of service counter-measure","year":"2002","author":"back","key":"ref14"},{"journal-title":"Google Places Api","year":"0","key":"ref15"},{"key":"ref16","article-title":"Characteri-zation of wireless multi-device users","author":"das","year":"2015","journal-title":"IEEE SECON"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"ref3","first-page":"13","article-title":"Privad: Practical privacy in online advertising","author":"guha","year":"2011","journal-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation NSDI'11"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M3144"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866936"},{"key":"ref8","first-page":"3","article-title":"Privacy-preserving aggregation of time-series data","volume":"2","author":"shi","year":"2011","journal-title":"NDSS"},{"key":"ref7","first-page":"3","article-title":"Privacy-preserving aggregation of time-series data","volume":"2","author":"shi","year":"2011","journal-title":"NDSS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382266"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/978-3-642-32946-3_15","article-title":"Privacy-preserving stream aggregation with fault tolerance","author":"chan","year":"2012","journal-title":"Financial Cryptography and Data Security"}],"event":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2015,8,3]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2015,8,6]]}},"container-title":["2015 24th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7287473\/7288342\/07288379.pdf?arnumber=7288379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:49:09Z","timestamp":1498250949000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7288379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icccn.2015.7288379","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}