{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:18:21Z","timestamp":1778300301514,"version":"3.51.4"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/perser.2005.1506394","type":"proceedings-article","created":{"date-parts":[[2005,9,12]],"date-time":"2005-09-12T15:19:24Z","timestamp":1126538364000},"page":"88-97","source":"Crossref","is-referenced-by-count":395,"title":["An anonymous communication technique using dummies for location-based services"],"prefix":"10.1109","author":[{"given":"H.","family":"Kido","sequence":"first","affiliation":[]},{"given":"Y.","family":"Yanagisawa","sequence":"additional","affiliation":[]},{"given":"T.","family":"Satoh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"2","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"1","year":"0"},{"key":"7","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","article-title":"Onion routing for anonymous and private internet connections","volume":"42","author":"goldschlag","year":"1999","journal-title":"Communications of the ACM (USA)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/6.272176"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","article-title":"Anonymity, unobservability, and pseudeonymity: A proposal for terminology","author":"pfitzmann","year":"2001","journal-title":"International workshop on Designing privacy enhancing technologies"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"11","article-title":"Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression","author":"samarati","year":"1998","journal-title":"Technical Report"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/304182.304572"}],"event":{"name":"ICPS '05. International Conference on Pervasive Services, 2005.","location":"Santorini, Greece"},"container-title":["ICPS '05. Proceedings. International Conference on Pervasive Services, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10064\/32279\/01506394.pdf?arnumber=1506394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T23:18:36Z","timestamp":1497655116000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1506394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/perser.2005.1506394","relation":{},"subject":[]}}