{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:43:05Z","timestamp":1729676585218,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wowmom.2010.5534928","type":"proceedings-article","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T22:19:00Z","timestamp":1281392340000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["A distributed privacy-preserving scheme for location-based queries"],"prefix":"10.1109","author":[{"given":"Emmanouil","family":"Magkos","sequence":"first","affiliation":[]},{"given":"Panayiotis","family":"Kotzanikolaou","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Sioutas","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Oikonomou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"On the security of ElGamal-based encryption","author":"tsiounis","year":"0","journal-title":"Proc Sixth Int l Workshop Theory and Practice in Public Key Cryptography Public Key Cryptography"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428740"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-6425-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"ref31","first-page":"171","article-title":"Preserving privacy in GPS traces via uncertainty-aware path cloaking","author":"hoh","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"year":"2005","key":"ref35","article-title":"Standards for efficient cryptography group. SEC 1: Elliptic curve cryptography"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74553-2_7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03511-1_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1102486.1102488"},{"key":"ref11","first-page":"1","article-title":"Anonymity, unobservability and pseudonymity - a proposal for terminology","author":"pfitzmann","year":"2000","journal-title":"Workshop on Design Issues in Anonymity and Unobservability"},{"key":"ref12","first-page":"178","article-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service","author":"chow","year":"2006","journal-title":"proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems"},{"key":"ref13","first-page":"362","article-title":"Privacy protection in location based services through a public-key privacy homomorphism","volume":"4582","author":"solanas","year":"2007","journal-title":"Public Key Infrastructure 4th European PKI Workshop Theory and Practice EuroPKI 2007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456410"},{"key":"ref17","article-title":"Location privacy in location-based services: Beyond TTP-based schemes","volume":"397","author":"solanas","year":"2008","journal-title":"Proceedings of the 1st International Workshop on Privacy in Location-Based Applications - PiLBA 2008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03511-1_4"},{"key":"ref28","article-title":"Achieving efficient query privacy for location based services","author":"olumofin","year":"2009","journal-title":"Tech Rep CACR Tech Report 2009&#x2013;22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"ref3","article-title":"Privacy-enhanced location-based access control","author":"ardagna","year":"2007","journal-title":"Handbook of Database Security Applications and Trends"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1567253.1567256"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1250896"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref7","first-page":"3","article-title":"Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy","volume":"2","author":"ghinita","year":"2009","journal-title":"Transactions on Data Privacy"},{"key":"ref2","article-title":"Location privacy and location-aware computing","author":"duckham","year":"2006","journal-title":"Investigating Change in Space and Time"},{"key":"ref9","article-title":"Path privacy in location-aware computing","author":"gruteser","year":"2004","journal-title":"Proc MobiSys 2004 Workshop Context-Awareness"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","article-title":"Privacy by design-principles of privacy-aware ubiquitous systems","volume":"2201","author":"langheinrich","year":"2001","journal-title":"Proc Ubicomp 2001 Ubiquitous Computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912774"},{"key":"ref22","article-title":"On the optimal placement of MIX zones","volume":"5672","author":"freudiger","year":"2009","journal-title":"9th International Symposium Privacy Enhancing Technologies - PETS 2009"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-73275-4_10","article-title":"On the effectiveness of changing pseudonyms to provide location privacy in vanets","author":"butty\u00e1n","year":"2007","journal-title":"Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks"},{"key":"ref24","first-page":"221","article-title":"Public-key cryptosystems based on discrete logarithms residues","volume":"1592","author":"paillier","year":"1999","journal-title":"Eurocrypt 99"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref26","first-page":"21","article-title":"Location Privacy in Moving-Object Environments","volume":"2","author":"lin","year":"2009","journal-title":"Transactions on Data Privacy"},{"key":"ref25","first-page":"152","article-title":"A formal model of obfuscation and negotiation for location privacy","volume":"3468","author":"duckham","year":"2005","journal-title":"Proceedings of Pervasive Computing Third International Conference PERVASIVE 2005"}],"event":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2010,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2010,6,17]]}},"container-title":["2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5513765\/5534887\/05534928.pdf?arnumber=5534928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:19:59Z","timestamp":1497874799000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5534928\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2010.5534928","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}