{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:31:22Z","timestamp":1729618282543,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/percom.2009.4912772","type":"proceedings-article","created":{"date-parts":[[2009,5,11]],"date-time":"2009-05-11T18:19:49Z","timestamp":1242065989000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-preserving event detection in pervasive spaces"],"prefix":"10.1109","author":[{"given":"Bijit","family":"Hore","sequence":"first","affiliation":[]},{"given":"Jehan","family":"Wickramasuriya","sequence":"additional","affiliation":[]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[]},{"given":"Nalini","family":"Venkatasubramanian","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Massaguer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Privacy by Design Principles of Privacy-Aware Ubiquitous Systems Presented at ACM UbiComp 2001","year":"2001","author":"langheinrich","key":"19"},{"key":"35","first-page":"48","article-title":"privacy protecting data collection in media spaces","author":"wickramasuriya","year":"2004","journal-title":"ACM Multimedia Conference"},{"year":"0","key":"17"},{"journal-title":"BROADCOM secure applications processor - bcm5890","year":"0","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1137\/0210002"},{"year":"0","key":"33"},{"key":"15","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","article-title":"squeling euros: privacy protection in rfid-enabled bank notes","volume":"lncs 2742","author":"juels","year":"2003","journal-title":"Financial Cryptography"},{"key":"34","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"security and privacy aspects of low-cost radio frequency identification systems","volume":"2802","author":"wets","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.909914"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912772"},{"journal-title":"S3-R1 The IBM Smart Surveillance System - Release 1","year":"0","key":"14"},{"year":"2004","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/RIDE.1994.282859"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379541"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.301"},{"journal-title":"Pervasive Human-Centered Computing","year":"0","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74767-3_50"},{"journal-title":"CRYPTO volume 3621 of Lecture Notes in Computer Science pages 223-240","year":"2005","author":"ostrovsky","key":"24"},{"key":"25","article-title":"protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. technical report","author":"samarati","year":"0","journal-title":"As technical report"},{"key":"26","article-title":"a framework for event composition in distributed systems","author":"pietzuch","year":"2003","journal-title":"Proc of the 4th Int Conf on Middleware (MW'03)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44892-6_22","article-title":"providing middleware support for active space applications","author":"roman","year":"2003","journal-title":"Middleware 2003"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/941326.941331"},{"year":"0","key":"3"},{"journal-title":"Responsphere","year":"2007","key":"2"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1990","author":"garey","key":"10"},{"journal-title":"Insider attacks","year":"1994","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.65"},{"year":"0","key":"7"},{"key":"6","article-title":"towards security and privacy for pervasive computing","author":"campbell","year":"2002","journal-title":"ISSS 2002"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"31","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.2000.848445","article-title":"practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"2000 IEEE Symposium on Research in Security and Privacy"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022244"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1026799.1026809"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0030-y"}],"event":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2009,3,9]]},"location":"Galveston, TX, USA","end":{"date-parts":[[2009,3,13]]}},"container-title":["2009 IEEE International Conference on Pervasive Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4906860\/4912739\/04912772.pdf?arnumber=4912772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T19:39:49Z","timestamp":1497814789000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4912772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/percom.2009.4912772","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}