{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:28:58Z","timestamp":1746404938038,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761339","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T18:14:59Z","timestamp":1394734499000},"page":"835-842","source":"Crossref","is-referenced-by-count":1,"title":["Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory"],"prefix":"10.1109","author":[{"family":"Xinyu Jin","sequence":"first","affiliation":[]},{"given":"Niki","family":"Pissinou","sequence":"additional","affiliation":[]},{"given":"Sitthapon","family":"Pumpichet","sequence":"additional","affiliation":[]},{"given":"Charles A.","family":"Kamhoua","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Kwiat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Bonnmotion A Mobility Scenario Generation and Analysis Tool","year":"0","key":"15"},{"journal-title":"An Introduction to Game Throy","year":"2004","author":"osborne","key":"13"},{"journal-title":"Game Throy","year":"1991","author":"drew fudenberg","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1190195.1190198"},{"journal-title":"Game Theory Analysis of Conflict","year":"1997","author":"myerson","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364508"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653702"},{"key":"1","first-page":"2012","article-title":"Trajectory privacy preservation-an inevitable issue towards future mobile sensor networks","volume":"2","author":"jin","year":"0","journal-title":"International Journal of Research and Reviews in Wireless Sensor Networks"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/GAMENETS.2009.5137411"},{"key":"7","article-title":"Trading privacy with incentives in mobile commerce: A game theoretic approach","author":"chorppath","year":"2012","journal-title":"Pervasive and Mobile Computing"},{"key":"6","first-page":"19","article-title":"Location privacy: Privacy, efficiency and recourse through a prohibitive contract","volume":"4","author":"croft","year":"2011","journal-title":"Transactions on Data Privacy"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17197-0_3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962511"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_14"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761339.pdf?arnumber=6761339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:18:44Z","timestamp":1490293124000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761339","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}