{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:01:57Z","timestamp":1725796917797},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/pccc.2014.7017108","type":"proceedings-article","created":{"date-parts":[[2015,1,23]],"date-time":"2015-01-23T21:24:09Z","timestamp":1422048249000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["POLA: A privacy-preserving protocol for location-based real-time advertising"],"prefix":"10.1109","author":[{"given":"Yiming","family":"Pang","sequence":"first","affiliation":[]},{"given":"Yichen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Peiyuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fudong","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"3","article-title":"Privad: Practical privacy in online advertising","author":"guha","year":"2011","journal-title":"NSDI"},{"key":"2","article-title":"Adnostic: Privacy preserving targeted advertising","author":"toubiana","year":"2010","journal-title":"NDSS"},{"key":"1","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/3-540-45353-9_30","article-title":"Targeted advertising... and privacy too","author":"juels","year":"2001","journal-title":"Topics in Cryptology-CT-RSA 2001"},{"key":"10","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","article-title":"Evaluating 2-dnf formulas on ciphertexts","author":"boneh","year":"2005","journal-title":"Theory of Cryptography"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848003"},{"key":"6","article-title":"Koi: A locationprivacy platform for smartphone apps","author":"guha","year":"2012","journal-title":"NSDI"},{"key":"5","article-title":"Privacy-aware personalization for mobile advertising","author":"g\ufffdtz","year":"2012","journal-title":"CCS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046782"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1145\/2534169.2486038","article-title":"Veriable auctions for online ad exchanges","author":"angel","year":"2013","journal-title":"SIGCOMM"}],"event":{"name":"2014 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2014,12,5]]},"location":"Austin, TX, USA","end":{"date-parts":[[2014,12,7]]}},"container-title":["2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7001444\/7017012\/07017108.pdf?arnumber=7017108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T23:04:29Z","timestamp":1566255869000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7017108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/pccc.2014.7017108","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}