{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T11:08:49Z","timestamp":1772881729324,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,11,10]]},"DOI":"10.1145\/1183471.1183500","type":"proceedings-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T20:15:56Z","timestamp":1168978556000},"page":"171-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":273,"title":["A peer-to-peer spatial cloaking algorithm for anonymous location-based service"],"prefix":"10.1145","author":[{"given":"Chi-Yin","family":"Chow","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]},{"given":"Mohamed F.","family":"Mokbel","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN"}]},{"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[{"name":"IBM Thomas J. Watson, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2006,11,10]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.415"},{"issue":"4","key":"e_1_3_2_1_3_1","first-page":"567","volume":"4","author":"Barbar\u00e1 D.","year":"1995","unstructured":"D. Barbar\u00e1 and T. Imielinski . Sleepers and Workaholics: Caching Strategies in Mobile Environments. The International Journal on VLDB 4 ( 4 ): 567 -- 602 , 1995 . D. Barbar\u00e1 and T. Imielinski. Sleepers and Workaholics: Caching Strategies in Mobile Environments. The International Journal on VLDB 4(4):567--602, 1995.","journal-title":"Sleepers and Workaholics: Caching Strategies in Mobile Environments. The International Journal on VLDB"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceeding of the IFIP Conference on Human-Computer Interaction, INTERACT","author":"Barkhuus L.","year":"2003","unstructured":"L. Barkhuus and A. K. Dey . Location-Based Services for Mobile Telephony: A Study of Users 'Privacy Concerns . In Proceeding of the IFIP Conference on Human-Computer Interaction, INTERACT 2003 . L. Barkhuus and A. K. Dey. Location-Based Services for Mobile Telephony: A Study of Users 'Privacy Concerns. In Proceeding of the IFIP Conference on Human-Computer Interaction, INTERACT 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"e_1_3_2_1_8_1","volume-title":"A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communications and Mobile Computing (WCMC) 2(5):483--502","author":"Camp T.","year":"2002","unstructured":"T. Camp , J. Boleng , and V. Davies . A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communications and Mobile Computing (WCMC) 2(5):483--502 , 2002 . T. Camp, J. Boleng, and V. Davies. A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communications and Mobile Computing (WCMC) 2(5):483--502, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071246.1071261"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13705"},{"key":"e_1_3_2_1_12_1","volume-title":"Sep 04, 2004.","author":"News Foxs","unstructured":"Foxs News . Man Accused of Stalking Ex-Girlfriend With GPS. http:\/\/www.foxnews.com\/story\/0,2933,131487,00.html . Sep 04, 2004. Foxs News. Man Accused of Stalking Ex-Girlfriend With GPS. http:\/\/www.foxnews.com\/story\/0,2933,131487,00.html. Sep 04, 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"ICDCS","author":"Gedik B.","year":"2005","unstructured":"B. Gedik and L. Liu . A Customizable k Anonymity Model for Protecting Location Privacy . In ICDCS 2005 . B. Gedik and L. Liu. A Customizable k Anonymity Model for Protecting Location Privacy. In ICDCS 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"e_1_3_2_1_16_1","volume-title":"Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility. In INFOCOM","author":"Hara T.","year":"2001","unstructured":"T. Hara . Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility. In INFOCOM 2001 . T. Hara. Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility. In INFOCOM 2001."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990039"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956894"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.142"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/194313.194317"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-002-0214-7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097064.1097094"},{"key":"e_1_3_2_1_25_1","volume-title":"Chan. GBL: Group-Based Location Updating in Mobile Environment. In DASFAA","author":"Lam G. H. K.","year":"2004","unstructured":"G. H. K. Lam , H. V. Leong , and S. C. F. Chan. GBL: Group-Based Location Updating in Mobile Environment. In DASFAA 2004 . G. H. K. Lam, H. V. Leong, and S. C. F. Chan. GBL: Group-Based Location Updating in Mobile Environment. In DASFAA 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.152"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/956676.956691"},{"key":"e_1_3_2_1_31_1","volume-title":"VLDB","author":"Mokbel M. F.","year":"2006","unstructured":"M. F. Mokbel , C.-Y. Chow , and W. G. Aref . The New Casper: Query Procesing for Location Services without Compromising Privacy . In VLDB 2006 . M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The New Casper: Query Procesing for Location Services without Compromising Privacy. In VLDB 2006."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/501431.501433"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the International Telecommunications Symposium","author":"Parekh A. K.","year":"1994","unstructured":"A. K. Parekh . Selecting Routers in Ad-Hoc Wireless Network . In Proceedings of the International Telecommunications Symposium 1994 . A. K. Parekh. Selecting Routers in Ad-Hoc Wireless Network. In Proceedings of the International Telecommunications Symposium 1994."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.667410"},{"key":"e_1_3_2_1_35_1","unstructured":"H. Schwetman. User's Guide CSIM19 Simulation Engine (C++ Version)Mesquite Software Inc.  H. Schwetman. User's Guide CSIM19 Simulation Engine (C++ Version)Mesquite Software Inc."},{"key":"e_1_3_2_1_36_1","volume-title":"Stream Control Transmission Protocol (SCTP): a reference guide Addison-Wesley Publishing Company","author":"Stewart R.","year":"2001","unstructured":"R. Stewart and Q. Xie . Stream Control Transmission Protocol (SCTP): a reference guide Addison-Wesley Publishing Company , Boston , 2001 . R. Stewart and Q. Xie. Stream Control Transmission Protocol (SCTP): a reference guide Addison-Wesley Publishing Company, Boston, 2001."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_39_1","volume-title":"Dec 30","author":"Today USA","year":"2002","unstructured":"USA Today . Authorities: GPS System Used to Stalk Woman . http:\/\/www.usatoday.com\/tech\/news\/2002-12-30-gps- stalker x.htm , Dec 30 , 2002 . USA Today. Authorities:GPS System Used to Stalk Woman. http:\/\/www.usatoday.com\/tech\/news\/2002-12-30-gps- stalker x.htm, Dec 30, 2002."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2003.1209608"}],"event":{"name":"CIKM06: Conference on Information and Knowledge Management","location":"Arlington Virginia USA","acronym":"CIKM06","sponsor":["ACM Association for Computing Machinery","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1183471.1183500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T19:24:26Z","timestamp":1672946666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1183471.1183500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,10]]},"references-count":39,"alternative-id":["10.1145\/1183471.1183500","10.1145\/1183471"],"URL":"https:\/\/doi.org\/10.1145\/1183471.1183500","relation":{},"subject":[],"published":{"date-parts":[[2006,11,10]]},"assertion":[{"value":"2006-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}