{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:38:24Z","timestamp":1729658304979,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/netsys.2015.7089083","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T16:32:28Z","timestamp":1429720348000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Optimized location update protocols for secure and efficient position sharing"],"prefix":"10.1109","author":[{"given":"Zohaib","family":"Riaz","sequence":"first","affiliation":[]},{"given":"Frank","family":"Durr","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Rothermel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"journal-title":"Stalkers turn to mobile technology and social media to harass victims - herald sun","year":"2014","author":"lucas","key":"ref3"},{"journal-title":"Gpslib - gps tracks hosting service","year":"0","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"year":"0","key":"ref11"},{"journal-title":"Optimized position update protocols for secure and efficient position sharing","year":"2013","author":"riaz","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/11957454_23","article-title":"Preserving user location privacy in mobile data management infrastructures","volume":"4258","author":"cheng","year":"2006","journal-title":"Privacy Enhancing Technologies"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11428572_10","article-title":"A formal model of obfuscation and negotiation for location privacy","volume":"3468","author":"duckham","year":"2005","journal-title":"Pervasive Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2011.5767584"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1997.581973"},{"journal-title":"World's biggest data breaches & hacks - information is beautiful","year":"2014","key":"ref1"}],"event":{"name":"2015 International Conference and Workshops on Networked Systems (NetSys)","start":{"date-parts":[[2015,3,9]]},"location":"Cottbus, Germany","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 International Conference and Workshops on Networked Systems (NetSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7083793\/7089054\/07089083.pdf?arnumber=7089083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T06:02:45Z","timestamp":1498197765000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7089083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/netsys.2015.7089083","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}