{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T22:36:36Z","timestamp":1774650996531,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infocom.2014.6848002","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T11:18:13Z","timestamp":1406632693000},"page":"754-762","source":"Crossref","is-referenced-by-count":327,"title":["Achieving k-anonymity in privacy-aware location-based services"],"prefix":"10.1109","author":[{"given":"Ben","family":"Niu","sequence":"first","affiliation":[]},{"given":"Qinghua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"T-closeness: Privacy beyond k-anonymity and l-diversity","author":"li","year":"2007","journal-title":"IEEE ICDE"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061995"},{"key":"15","article-title":"Providing privacy-aware incentives for mobile sensing","author":"li","year":"2013","journal-title":"IEEE PERCOM"},{"key":"16","article-title":"Efficient privacy-preserving stream aggregation in mobile sensing with low aggregation error","author":"li","year":"2013","journal-title":"ACM PETS"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934991"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"12","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","article-title":"Towards an information theoretic metric for anonymity","author":"serjantov","year":"2003","journal-title":"Proceedings of the 2nd International Conference on Privacy Enhancing Technologies"},{"key":"21","article-title":"Eps: Encounterbased privacy-preserving scheme for location-based services","author":"niu","year":"2013","journal-title":"IEEE GLOBECOM"},{"key":"20","article-title":"3plus: Privacy-preserving pseudolocation updating system in location-based services","author":"niu","year":"2013","journal-title":"IEEE WCNC"},{"key":"22","article-title":"Mobicache: When k-anonymity meets cache","author":"zhu","year":"2013","journal-title":"IEEE GLOBECOM"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883443"},{"key":"24","article-title":"Protecting location privacy through path confusion","author":"hoh","year":"2005","journal-title":"IEEE SecureComm"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"27","year":"2011"},{"key":"28","author":"bilogrevic","year":"2011","journal-title":"Privacy in Mobile Computing for Location-sharing-based Services"},{"key":"29","author":"frejinger","year":"2008","journal-title":"Route Choice Analysis Data Models Algorithms and Applications"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247689"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860017"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514414"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.145"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620591"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869797"},{"key":"4","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"ACM VLDB"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1626536.1626540"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications","location":"Toronto, ON, Canada","start":{"date-parts":[[2014,4,27]]},"end":{"date-parts":[[2014,5,2]]}},"container-title":["IEEE INFOCOM 2014 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6839150\/6847911\/06848002.pdf?arnumber=6848002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:29:51Z","timestamp":1498138191000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6848002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/infocom.2014.6848002","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}