{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:18Z","timestamp":1750307658088,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1454503.1454544","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T12:18:35Z","timestamp":1225196315000},"page":"229-238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Game theoretic approach to location sharing with privacy in a community-based mobile safety application"],"prefix":"10.1145","author":[{"given":"Hua","family":"Liu","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Murali","family":"Annavaram","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Mobile phone  http:\/\/en.wikipedia.org\/wiki\/Mobile phone"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/news.bbc.co.uk\/2\/hi\/technology\/6245798.stm  http:\/\/news.bbc.co.uk\/2\/hi\/technology\/6245798.stm"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.nbc11.com\/news\/15255056\/detail.html  http:\/\/www.nbc11.com\/news\/15255056\/detail.html"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/332186.332199"},{"key":"e_1_3_2_1_5_1","first-page":"259","volume-title":"International Conference on Performance, Computing, and Communications","author":"Agah A.","year":"2004","unstructured":"A. Agah , S.K. Das , and K. Basu . A game theory based approach for security in wireless sensor networks . In International Conference on Performance, Computing, and Communications , pages 259 -- 263 , 2004 . A. Agah, S.K. Das, and K. Basu. A game theory based approach for security in wireless sensor networks. In International Conference on Performance, Computing, and Communications, pages 259--263, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"To Appear in the workshop on Mobile Devices and Urban Sensing","author":"Annavaram M.","year":"2008","unstructured":"M. Annavaram , Q. Jacobson and J.P. Shen . HangOut: A Privacy Preserving Social Networking Application Invited paper . To Appear in the workshop on Mobile Devices and Urban Sensing , April , 2008 . M. Annavaram, Q. Jacobson and J.P. Shen. HangOut: A Privacy Preserving Social Networking Application Invited paper. To Appear in the workshop on Mobile Devices and Urban Sensing, April, 2008."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 9th International Conference on Human-Computer Interaction","author":"Barkhuus L.","year":"2003","unstructured":"L. Barkhuus , and A.K. Dey . Location-based services for mobile telephony: a study of users? privacy concerns . In Proceedings of the 9th International Conference on Human-Computer Interaction , 2003 . L. Barkhuus, and A.K. Dey. Location-based services for mobile telephony: a study of users? privacy concerns. In Proceedings of the 9th International Conference on Human-Computer Interaction, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587057"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293475"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247688"},{"key":"e_1_3_2_1_12_1","volume-title":"Technology and privacy: the new landscape","author":"Davies S.G.","year":"1997","unstructured":"S.G. Davies . Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity . In Technology and privacy: the new landscape , MIT Press , 1997 . S.G. Davies. Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity. In Technology and privacy: the new landscape, MIT Press, 1997."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314470"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_15_1","volume-title":"Game Theory","author":"Fudenberg D.","year":"1991","unstructured":"D. Fudenberg and J. Tirole . Game Theory . MIT Press , 1991 . D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359227"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378604"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073008"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"e_1_3_2_1_25_1","volume-title":"Editor","author":"Liu H.","year":"2008","unstructured":"H. Liu , B. Krishnamachari , and S. Kapadia . Game Theoretic Tools Applied to Wireless Networks. Encyclopedia of Ad Hoc and Ubiquitous Computing , Editor D. Agrawal, World Scientific Publishers , 2008 . H. Liu, B. Krishnamachari, and S. Kapadia. Game Theoretic Tools Applied to Wireless Networks. Encyclopedia of Ad Hoc and Ubiquitous Computing, Editor D. Agrawal, World Scientific Publishers, 2008."},{"volume-title":"Distributed Algorithms","year":"1997","key":"e_1_3_2_1_26_1","unstructured":"N.A.Lynch. Distributed Algorithms . Morgan Kaufmann Publisher , 1997 . N.A.Lynch. Distributed Algorithms. Morgan Kaufmann Publisher, 1997."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01672-1","volume-title":"Game Theory for Wireless Engineers. Morgan &amp","author":"Mackenzie A.","year":"2006","unstructured":"A. Mackenzie and L. DaSilva . Game Theory for Wireless Engineers. Morgan &amp ; Claypool Publishers , March 2006 . A. Mackenzie and L. DaSilva. Game Theory for Wireless Engineers. Morgan &amp; Claypool Publishers, March 2006."},{"key":"e_1_3_2_1_28_1","first-page":"763","volume-title":"Proceedings of the 32nd international conference on Very large data bases","author":"Mokbel M.F.","year":"2006","unstructured":"M.F. Mokbel , C. Chow , and W.G. Aref . The new casper: query processing for location services without compromising privacy . In Proceedings of the 32nd international conference on Very large data bases , pages 763 -- 774 . 2006 . M.F. Mokbel, C. Chow, and W.G. Aref. The new casper: query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pages 763--774. 2006."},{"key":"e_1_3_2_1_29_1","first-page":"863","volume-title":"International Journal of Urban and Regional Research, 31(4)","author":"Nasar J.","year":"2007","unstructured":"J. Nasar and P. Hecht and R. Wener . Call if You Have Trouble: Mobile Phones and Safety among College Students , In International Journal of Urban and Regional Research, 31(4) , pages 863 -- 873 , December 2007 . J. Nasar and P. Hecht and R. Wener. Call if You Have Trouble: Mobile Phones and Safety among College Students, In International Journal of Urban and Regional Research, 31(4), pages 863--873, December 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099203.1099220"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542827"},{"key":"e_1_3_2_1_33_1","author":"Patwardhan A.","year":"2006","unstructured":"A. Patwardhan , F. Perich , A. Joshi , T. Finin , and T. Yesha . Querying in Packs: Trustworthy Data Management in Ad Hoc Networks. International Journal of Wireless Information Networks , April 2006 . A. Patwardhan, F. Perich, A. Joshi, T. Finin, and T. Yesha. Querying in Packs: Trustworthy Data Management in Ad Hoc Networks. International Journal of Wireless Information Networks, April 2006.","journal-title":"International Journal of Wireless Information Networks"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322324"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022289231864"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124788"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219198999000219"}],"event":{"name":"MSWiM '08: The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Vancouver British Columbia Canada","acronym":"MSWiM '08"},"container-title":["Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454503.1454544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1454503.1454544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:27Z","timestamp":1750253367000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454503.1454544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":38,"alternative-id":["10.1145\/1454503.1454544","10.1145\/1454503"],"URL":"https:\/\/doi.org\/10.1145\/1454503.1454544","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}