{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:25:29Z","timestamp":1729621529519,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/wcnc.2014.6953141","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T14:59:19Z","timestamp":1417013959000},"page":"3456-3461","source":"Crossref","is-referenced-by-count":9,"title":["Preserving location privacy based on distributed cache pushing"],"prefix":"10.1109","author":[{"given":"Ming","family":"Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenzhong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhuo","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sanglu","family":"Lu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daoxu","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315266","article-title":"Preserving privacy in GPS traces via uncertainty-aware path cloaking","author":"hoh","year":"2007","journal-title":"CCS"},{"key":"17","article-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service","author":"chow","year":"2006","journal-title":"ACM GIS"},{"key":"18","article-title":"Geonotes: Social and navigational aspects of location-based information systems","author":"espinoza","year":"2001","journal-title":"Ubicomp"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"16","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-540-73540-3_13","article-title":"Mobihide: A mobilea peerto-peer system for anonymous location-based queries","author":"ghinita","year":"2007","journal-title":"Advances in Spatial and Temporal Databases"},{"key":"13","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"VLDB"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/11957454_23","article-title":"Preserving user location privacy in mobile data management infrastructures","author":"cheng","year":"2006","journal-title":"Privacy Enhancing Technologies"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"journal-title":"Advertise with promoted tweets twitter for business","year":"0","key":"3"},{"key":"20","first-page":"197","article-title":"Cach\ufffd: Caching location-enhanced content to improve user privacy","author":"amini","year":"2011","journal-title":"MobiSys ACM"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.20"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"5","first-page":"485","article-title":"The privacy implications of personal locators: Why you should think twice before voluntarily availing yourself to GPS monitoring","volume":"14","author":"karim","year":"2004","journal-title":"Wash UJL & Pol'y"},{"journal-title":"The 10 billion rule Location location location","year":"0","author":"patel","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.269"}],"event":{"name":"2014 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2014,4,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2014,4,9]]}},"container-title":["2014 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6923023\/6951847\/06953141.pdf?arnumber=6953141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T08:31:13Z","timestamp":1690705873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6953141\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2014.6953141","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}