{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T15:50:56Z","timestamp":1762444256953,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046781","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"653-666","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Privacy and accountability for location-based aggregate statistics"],"prefix":"10.1145","author":[{"given":"Raluca Ada","family":"Popa","sequence":"first","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Andrew J.","family":"Blumberg","sequence":"additional","affiliation":[{"name":"University of Texas, Austin, TX, USA"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Frank H.","family":"Li","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40965-6_6"},{"key":"e_1_3_2_1_2_1","volume-title":"Usenix Security","author":"Balasch J.","year":"2010","unstructured":"J. Balasch , A. Rial , C. Troncoso , B. Preneel , I. Verbauwhede , and C. Geuens . PrETP: Privacy-preserving electronic toll pricing . Usenix Security , 2010 . J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede, and C. Geuens. PrETP: Privacy-preserving electronic toll pricing. Usenix Security, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"CRYPTO","author":"Bellare M.","year":"1992","unstructured":"M. Bellare and O. Goldreich . On defining proofs of knowledge . CRYPTO , 1992 . M. Bellare and O. Goldreich. On defining proofs of knowledge. CRYPTO, 1992."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756212"},{"key":"e_1_3_2_1_6_1","volume-title":"Usenix Security","author":"Burkhart M.","year":"2010","unstructured":"M. Burkhart , M. Strasser , D. Many , and X. Dimitropoulos . SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics . Usenix Security , 2010 . M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. Usenix Security, 2010."},{"key":"e_1_3_2_1_7_1","unstructured":"California Department of Transportation. Caltrans guide for the preparation of traffic impact studies.  California Department of Transportation. Caltrans guide for the preparation of traffic impact studies."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180431"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_10"},{"key":"e_1_3_2_1_10_1","volume-title":"Security and Cryptography for Networks","author":"Camenisch J.","year":"2002","unstructured":"J. Camenisch and A. Lysyanskaya . A Signature Scheme with Efficient Protocols . Security and Cryptography for Networks , 2002 . J. Camenisch and A. Lysyanskaya. A Signature Scheme with Efficient Protocols. Security and Cryptography for Networks, 2002."},{"key":"e_1_3_2_1_11_1","volume-title":"TAMC 1--19","author":"Dwork C.","year":"2008","unstructured":"C. Dwork . Differential privacy: A survey of results . In TAMC 1--19 , 2008 . C. Dwork. Differential privacy: A survey of results. In TAMC 1--19, 2008."},{"key":"e_1_3_2_1_12_1","unstructured":"E-ZPass. How it works. http:\/\/www.ezpass.com\/index.html.  E-ZPass. How it works. http:\/\/www.ezpass.com\/index.html."},{"key":"e_1_3_2_1_13_1","volume-title":"CRYPTO","author":"Fiat A.","year":"1986","unstructured":"A. Fiat and A. Shamir . How to prove yourself: Practical solutions to identification and signature problems . CRYPTO , 1986 . A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. CRYPTO, 1986."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_19"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378604"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.69"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866318"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758167"},{"key":"e_1_3_2_1_25_1","unstructured":"J. Lowensohn. Apple sued over location tracking in iOS. http:\/\/news.cnet.com\/8301--27076\\_3--20057245--248.html 2011. CNET News.  J. Lowensohn. Apple sued over location tracking in iOS. http:\/\/news.cnet.com\/8301--27076\\_3--20057245--248.html 2011. CNET News."},{"key":"e_1_3_2_1_26_1","unstructured":"E. Mills. Google sued over Android data location collection. http:\/\/news.cnet.com\/8301--27080\\_3--20058493--245.html 2011. CNET News.  E. Mills. Google sued over Android data location collection. http:\/\/news.cnet.com\/8301--27080\\_3--20058493--245.html 2011. CNET News."},{"key":"e_1_3_2_1_27_1","unstructured":"Mobile Millennium. http:\/\/traffic.berkeley.edu\/.  Mobile Millennium. http:\/\/traffic.berkeley.edu\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555823"},{"key":"e_1_3_2_1_29_1","volume-title":"NDSS","author":"Narayanan A.","year":"2011","unstructured":"A. Narayanan , N. Thiagarajan , M. Lakhani , M. Hamburg , and D. Boneh . Location privacy via private proximity testing . NDSS , 2011 . A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. NDSS, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_31_1","volume-title":"CRYPTO","author":"Pedersen T. P.","year":"1991","unstructured":"T. P. Pedersen . Non-interactive and information-theoretic secure verifiable secret sharing . CRYPTO , 1991 . T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. CRYPTO, 1991."},{"key":"e_1_3_2_1_32_1","volume-title":"Usenix Security","author":"Popa R. A.","year":"2009","unstructured":"R. A. Popa , H. Balakrishnan , and A. J. Blumberg . VPriv: Protecting privacy in location-based vehicular services . Usenix Security , 2009 . R. A. Popa, H. Balakrishnan, and A. J. Blumberg. VPriv: Protecting privacy in location-based vehicular services. Usenix Security, 2009."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734585"},{"key":"e_1_3_2_1_34_1","volume-title":"TomTom admits to sending your routes and speed information to the police","author":"Reid R.","year":"2011","unstructured":"R. Reid . TomTom admits to sending your routes and speed information to the police , 2011 . CNET UK. R. Reid. TomTom admits to sending your routes and speed information to the police, 2011. CNET UK."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.09.006"},{"key":"e_1_3_2_1_36_1","volume-title":"CRYPTO","author":"Schnorr C. P.","year":"1989","unstructured":"C. P. Schnorr . Efficient identification and signatures for smart cards . CRYPTO , 1989 . C. P. Schnorr. Efficient identification and signatures for smart cards. CRYPTO, 1989."},{"key":"e_1_3_2_1_37_1","volume-title":"NDSS","author":"Shi E.","year":"2011","unstructured":"E. Shi , T.-H. H. Chan , E. Rieffel , R. Chow , and D. Song . Privacy-preserving aggregation of time-series data . In NDSS , 2011 . E. Shi, T.-H. H. Chan, E. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In NDSS, 2011."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_39_1","volume-title":"NSDI","author":"Walfish M.","year":"2006","unstructured":"M. Walfish , J. Zamfirescu , H. Balakrishnan , D. Karger , and S. Shenker . Distributed quota enforcement for spam control . In NSDI , 2006 . M. Walfish, J. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker. Distributed quota enforcement for spam control. In NSDI, 2006."},{"key":"e_1_3_2_1_40_1","volume-title":"Thieves robbed home based on Facebook","author":"Police UR.","year":"2010","unstructured":"WM UR. Police : Thieves robbed home based on Facebook , 2010 . http:\/\/www.wmur.com\/r\/24943582\/detail.html. WMUR. Police: Thieves robbed home based on Facebook, 2010. http:\/\/www.wmur.com\/r\/24943582\/detail.html."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779335"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":41,"alternative-id":["10.1145\/2046707.2046781","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046781","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}