{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:48:59Z","timestamp":1729633739355,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/wcnc.2016.7564715","type":"proceedings-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T22:07:55Z","timestamp":1475791675000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Time obfuscation-based privacy-preserving scheme for location-based services"],"prefix":"10.1109","author":[{"given":"Fenghua","family":"Li","sequence":"first","affiliation":[]},{"given":"Sheng","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/TDSC.2013.57","article-title":"Hiding in the mobile crowd: Locationprivacy through collaboration","volume":"11","author":"shokri","year":"2014","journal-title":"Dependable and Secure Computing IEEE Transactions on"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/INFCOM.2011.5934968"},{"key":"ref12","article-title":"The new casper: query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"Proc ACM VLDB"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1183471.1183500"},{"key":"ref14","article-title":"Jointcache: Collaborative path confusion through lightweight p2p communication","author":"dong","year":"2013","journal-title":"Proc of IEEE PerCom"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2660267.2660270"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"ref17","article-title":"Anatomization and protection of mobile apps location privacy threats","author":"fawaz","year":"2015","journal-title":"Proc of USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1142\/S0218488502001648"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICCNC.2015.7069372"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICCNC.2015.7069322"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MWC.2012.6155874"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2046556.2046576"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-642-22263-4_5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1626536.1626540"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MASS.2014.53"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICDMW.2014.122"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-642-31540-4_7"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1620585.1620591"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICDE.2006.1"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1869790.1869797"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1514411.1514414"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFOCOM.2008.145"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/INFOCOM.2014.6848002"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/INFCOM.2009.5061995"}],"event":{"name":"2016 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2016,4,3]]},"location":"Doha, Qatar","end":{"date-parts":[[2016,4,6]]}},"container-title":["2016 IEEE Wireless Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7536276\/7564633\/07564715.pdf?arnumber=7564715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:31:53Z","timestamp":1498350713000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7564715\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2016.7564715","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}