{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:20Z","timestamp":1763468060727,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/percomw.2012.6197582","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:30:23Z","timestamp":1337884223000},"page":"584-589","source":"Crossref","is-referenced-by-count":24,"title":["Private context-aware recommendation of points of interest: An initial investigation"],"prefix":"10.1109","author":[{"given":"Daniele","family":"Riboni","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"486","article-title":"Our data, ourselves: Privacy via distributed noise generation","volume":"4004","author":"dwork","year":"2006","journal-title":"LNCS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810916"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2011.17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0049-3"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0304_3"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_7"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2009.41"},{"key":"2","first-page":"392","article-title":"Personalization method for tourist point of interest (poi) recommendation","volume":"4251","author":"kang","year":"2006","journal-title":"LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2006.55"},{"key":"10","first-page":"1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"LNCS"},{"key":"7","first-page":"627","article-title":"Differentially private recommender systems: Building privacy into the netflix prize contenders","author":"mcsherry","year":"2009","journal-title":"Proc of ACM SIGKDD"},{"key":"6","first-page":"14","article-title":"Do you trust your recommendations? An exploration of security and privacy issues in recommender systems","volume":"3995","author":"lam","year":"2006","journal-title":"LNCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21675-6_61"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0389-x"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.14778\/1988776.1988780"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"}],"event":{"name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","start":{"date-parts":[[2012,3,19]]},"location":"Lugano, Switzerland","end":{"date-parts":[[2012,3,23]]}},"container-title":["2012 IEEE International Conference on Pervasive Computing and Communications Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6192378\/6197445\/06197582.pdf?arnumber=6197582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T14:12:11Z","timestamp":1490105531000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6197582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/percomw.2012.6197582","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}