{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:09:53Z","timestamp":1772064593430,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infocom.2014.6847945","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:18:13Z","timestamp":1406647093000},"page":"244-252","source":"Crossref","is-referenced-by-count":99,"title":["FINE: A fine-grained privacy-preserving location-based service framework for mobile devices"],"prefix":"10.1109","author":[{"given":"Jun","family":"Shao","sequence":"first","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"22","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/11844662_6","article-title":"Off-line keyword guessing attacks on recent keyword search schemes over encrypted data","volume":"4165","author":"byun","year":"2006","journal-title":"Secure Data Management Lecture Notes in Computer Science"},{"key":"17","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-based encryption from the weil pairing","volume":"32","author":"boneh","year":"2003","journal-title":"SIAM Journal of Computing"},{"key":"23","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/978-3-540-74853-3_22","article-title":"Safeguarding location privacy in wireless adhoc networks","volume":"4717","author":"hashem","year":"2007","journal-title":"Ubicomp Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-642-04474-8_28","article-title":"Privacy-aware attribute-based encryption with user accountability","volume":"5735","author":"li","year":"2009","journal-title":"ISC Lecture Notes in Computer Science"},{"key":"24","article-title":"Privacy-preserving and content-protecting location based queries","author":"paulet","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"15","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1145\/1533057.1533094","article-title":"Attribute based proxy reencryption with delegating capabilities","author":"liang","year":"2009","journal-title":"ASIACCS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"13","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/BFb0054122","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"EUROCRYPT Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-642-00468-1_20","article-title":"Cca-secure proxy re-encryption without pairings","volume":"5443","author":"shao","year":"2009","journal-title":"Public Key Cryptography Lecture Notes in Computer Science"},{"key":"11","article-title":"Outsourcing the decryption of abe ciphertexts","author":"green","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.146"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"3","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","article-title":"Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy","volume":"4605","author":"khoshgozaran","year":"2007","journal-title":"SSTD Lecture Notes in Computer Science"},{"key":"20","first-page":"123","article-title":"Over-encryption: Management of access control evolution on outsourced data","author":"di vimercati","year":"2007","journal-title":"VLDB ACM"},{"key":"2","author":"chow","year":"2010","journal-title":"Privacy-preserving Location-based Services"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544932"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2252011"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.95"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620591"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.269"},{"key":"8","article-title":"Search me if you can: Privacy-preserving location query service","author":"jung","year":"2012","journal-title":"CoRR"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications","location":"Toronto, ON, Canada","start":{"date-parts":[[2014,4,27]]},"end":{"date-parts":[[2014,5,2]]}},"container-title":["IEEE INFOCOM 2014 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6839150\/6847911\/06847945.pdf?arnumber=6847945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:29:47Z","timestamp":1498152587000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6847945\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infocom.2014.6847945","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}