{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:34:42Z","timestamp":1730306082849,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/wowmom.2013.6583401","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T19:31:28Z","timestamp":1377804688000},"page":"1-9","source":"Crossref","is-referenced-by-count":7,"title":["Track me if you can: Transparent obfuscation for Location based Services"],"prefix":"10.1109","author":[{"given":"Roberto","family":"Di Pietro","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Mandati","sequence":"additional","affiliation":[]},{"given":"Nino Vincenzo","family":"Verde","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.40"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MDMW.2008.8"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199361"},{"key":"16","first-page":"227","article-title":"Protecting user anonymity in location-based services with fragmented cloaking region","volume":"3","author":"cheng li","year":"2012","journal-title":"IEEE CSAE"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"14","first-page":"295","article-title":"Location privacy for users of wireless devices through cloaking","author":"bowen","year":"2008","journal-title":"Proceedings of the 41st HICSS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2005.300973"},{"key":"12","first-page":"325","article-title":"Time warp: How time affects privacy in LBSs","author":"marconi","year":"2010","journal-title":"Proceedings of the 12th ICICS"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734585"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5578914"},{"key":"20","first-page":"275","article-title":"Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs","author":"ristenpart","year":"2008","journal-title":"Proc 10th USENIX Security"},{"journal-title":"Geolocation Use and Concerns Survey","year":"2012","author":"kessinger","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/0470092335"},{"key":"10","article-title":"Location-based services for mobile telephony: A study of users' privacy concerns","author":"barkhuus","year":"2003","journal-title":"interactions"},{"year":"2012","key":"7"},{"year":"2012","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"year":"2012","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"}],"event":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2013,6,4]]},"location":"Madrid, Spain","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570845\/6583357\/06583401.pdf?arnumber=6583401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T20:53:08Z","timestamp":1616187188000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6583401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2013.6583401","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}