{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:05:12Z","timestamp":1730279112779,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/ivs.2014.6856595","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T16:27:44Z","timestamp":1406651264000},"page":"1030-1036","source":"Crossref","is-referenced-by-count":17,"title":["Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services"],"prefix":"10.1109","author":[{"given":"George","family":"Corser","sequence":"first","affiliation":[]},{"given":"Huirong","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"D'Errico","sequence":"additional","affiliation":[]},{"given":"Warren","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Supeng","family":"Leng","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"18","first-page":"106","article-title":"T-Closeness: Privacy beyond k-anonymity and ?-diversity","author":"ninghui","year":"2007","journal-title":"Proceedings - International Conference on Data Engineering"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684166"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_4"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1626536.1626540"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655204"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4939288"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090403"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1374688.1374698"},{"year":"0","key":"24"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"journal-title":"Your Connected Vehicle Is Arriving","year":"2012","author":"koslowski","key":"3"},{"journal-title":"Location-based Services to Bring in $4b Revenue in 2012 Study","year":"2012","author":"johnson","key":"2"},{"key":"10","article-title":"A unified framework for location privacy","author":"shokri","year":"2010","journal-title":"3rd Hot Topics in Privacy Enhancing Technologies (HotPETs)"},{"journal-title":"GM AT&T Readying In-vehicle Wi-fi","year":"2013","author":"bush","key":"1"},{"journal-title":"CARAVAN Providing Location Privacy for VANET","year":"2005","author":"sampigethaya","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2013.6799822"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"journal-title":"IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages","first-page":"1","year":"2013","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300813"}],"event":{"name":"2014 IEEE Intelligent Vehicles Symposium (IV)","start":{"date-parts":[[2014,6,8]]},"location":"MI, USA","end":{"date-parts":[[2014,6,11]]}},"container-title":["2014 IEEE Intelligent Vehicles Symposium Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6848889\/6856370\/06856595.pdf?arnumber=6856595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:00:24Z","timestamp":1490284824000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6856595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ivs.2014.6856595","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}