{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T05:36:10Z","timestamp":1737005770730,"version":"3.33.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,11]]},"DOI":"10.1109\/icceic64099.2024.10775741","type":"proceedings-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:21:58Z","timestamp":1733955718000},"page":"173-177","source":"Crossref","is-referenced-by-count":0,"title":["A Location privacy protection scheme based on k-anonymity and group signature"],"prefix":"10.1109","author":[{"given":"Yipeng","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, North China University of Technology,Beijing,China"}]},{"given":"Peixuan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, North China University of Technology,Beijing,China"}]},{"given":"Wenzhuo","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, North China University of Technology,Beijing,China"}]},{"given":"Zinan","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, North China University of Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref2","first-page":"73","article-title":"k Anonymous Location Privacy Preservation Scheme Based on Geohash Coding","volume":"68","author":"Yin","year":"2021","journal-title":"Journal of Wuhan University (Natural Science Edition)"},{"issue":"2","key":"ref3","first-page":"367","article-title":"A k-anonymous location privacy preserving scheme for assigned queries","volume":"36","author":"Song","year":"2024","journal-title":"Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition)"},{"issue":"5","key":"ref4","first-page":"163","article-title":"An Authenticated Anonymous Query Scheme","volume":"42","author":"Du","year":"2016","journal-title":"Computer Engineering"},{"key":"ref5","first-page":"128","article-title":"Pseudo-random number encryption based location privacy preserving nearest neighbor querying","volume":"05","author":"Zhang","year":"2015","journal-title":"Journal of East China Normal University (Natural Science)"},{"issue":"1","key":"ref6","first-page":"13","article-title":"Differential Privacy Trajectory Data Protection Scheme","volume":"45","author":"Song","year":"2022","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"issue":"6","key":"ref7","first-page":"1","article-title":"A review of location privacy protection technologies in location-based services","volume":"34","author":"Cao","year":"2024","journal-title":"Computer Technology and Development"},{"key":"ref8","first-page":"134","article-title":"A privacy protection scheme based on spatiotemporal correlation in location-based services","volume":"39","author":"Li","year":"2018","journal-title":"Journal of Communication"},{"key":"ref9","first-page":"212","article-title":"Location Privacy Preserving Nearest Neighbor Querying Based on Geohash","volume":"46","author":"Zhou","year":"2019","journal-title":"Computer Science"},{"key":"ref10","first-page":"2469","article-title":"n privacy protection via local differential privacy under k-anonymity","volume":"39","author":"Liu","year":"2022","journal-title":"Journal of Computer Applications Research"},{"issue":"4","key":"ref11","first-page":"57","article-title":"A group signature scheme based on BLS short signatures","volume":"24","author":"Li","year":"2011","journal-title":"Journal of Qingdao University (Natural Science Edition)"},{"issue":"1","key":"ref12","first-page":"21","article-title":"Organization and Efficient Range Query of Large Trajectory Data Based on Geohash","volume":"42","author":"Xiang","year":"2017","journal-title":"Geomatics and Information Science of Wuhan University"},{"issue":"5","key":"ref13","first-page":"1061","article-title":"Blockchain User Anonymity and Traceability Technology","volume":"42","author":"Li","year":"2020","journal-title":"Journal of Electronics & Information Technology"},{"issue":"5","key":"ref14","first-page":"158","article-title":"Blockchain Privacy-Traceable Deposit Scheme for Power-Dispatch Instruction","volume":"50","author":"Wang","year":"2024","journal-title":"Computer Engineering"}],"event":{"name":"2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","start":{"date-parts":[[2024,10,11]]},"location":"Guangzhou, China","end":{"date-parts":[[2024,10,13]]}},"container-title":["2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10774577\/10775297\/10775741.pdf?arnumber=10775741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:25:59Z","timestamp":1736969159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10775741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icceic64099.2024.10775741","relation":{},"subject":[],"published":{"date-parts":[[2024,10,11]]}}}