{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:05:53Z","timestamp":1770537953640,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infcom.2012.6195577","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:26:40Z","timestamp":1337884000000},"page":"1996-2004","source":"Crossref","is-referenced-by-count":65,"title":["L2P2: Location-aware location privacy protection for location-based services"],"prefix":"10.1109","author":[{"given":"Yu","family":"Wang","sequence":"first","affiliation":[]},{"family":"Dingbang Xu","sequence":"additional","affiliation":[]},{"family":"Xiao He","sequence":"additional","affiliation":[]},{"family":"Chao Zhang","sequence":"additional","affiliation":[]},{"family":"Fan Li","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"18","author":"samet","year":"1990","journal-title":"The Design and Analysis of Spatial Data Structures"},{"key":"15","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"0","journal-title":"Proc of VLDB '06 2006"},{"key":"16","first-page":"34","article-title":"Location privacy and location-aware computing","author":"duckham","year":"2006","journal-title":"Dynamic & Mobile GIS Investigating Change in Space and Time"},{"key":"13","article-title":"Protecting location privacy through path confusion","author":"hoh","year":"0","journal-title":"Proc of the 1st Int'l Conf on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM) 2005"},{"key":"14","article-title":"Preserving privacy in GPS traces via uncertainty-aware path cloaking","author":"hoh","year":"0","journal-title":"Proc of ACM CCS 2007"},{"key":"11","first-page":"620","article-title":"A customizable k-anonymity model for protecting location privacy","author":"gedik","year":"2004","journal-title":"Proc IEEE ICDCS'05"},{"key":"12","article-title":"On the anonymity of periodic location samples","author":"gruteser","year":"0","journal-title":"Proc of the 2nd Int'l Conf on Security in Pervasive Computing 2005"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"1","article-title":"Google, Apple track users' location information, but why?","author":"heussner","year":"2011","journal-title":"ABC News"},{"key":"10","article-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service","author":"chow","year":"0","journal-title":"Proc of ACM Int'l Symp on Advances in Geographic Information Systems (GIS) 2006"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"6","article-title":"Protecting privacy against location-based personal identification","author":"bettini","year":"0","journal-title":"Proc of 2nd VLDB Workshop on Secure Data Management 2005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015231126594"},{"key":"4","article-title":"Feeling-based location privacy protection for locationbased services","author":"xu","year":"0","journal-title":"Proc of ACM CCS '09 2009"},{"key":"9","article-title":"Preserving user location privacy in mobile data management infrastructures","author":"cheng","year":"0","journal-title":"Proc of the 6th Workshop on Privacy Enhancing Technologies 2006"},{"key":"8","article-title":"A formal model of obfuscation and negotiation for location privacy","author":"duckham","year":"0","journal-title":"Proc of the 3rd Int'l Conf on Pervasive Computing (Pervasive 2005) 2005"}],"event":{"name":"IEEE INFOCOM 2012 - IEEE Conference on Computer Communications","location":"Orlando, FL, USA","start":{"date-parts":[[2012,3,25]]},"end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6189419\/6195452\/06195577.pdf?arnumber=6195577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:51:14Z","timestamp":1490097074000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6195577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/infcom.2012.6195577","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}