{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:46Z","timestamp":1750306786187,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517840.2517853","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"167-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Optimal sporadic location privacy preserving systems in presence of bandwidth constraints"],"prefix":"10.1145","author":[{"given":"Michael","family":"Herrmann","sequence":"first","affiliation":[{"name":"KU Leuven ESAT\/COSIC, iMinds, Leuven, Belgium"}]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[{"name":"Gradiant, Vigo, Spain"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"KU Leuven ESAT\/COSIC, iMinds, Leuven, Belgium"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"KU Leuven ESAT\/COSIC, iMinds, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Foursquare. https:\/\/foursquare.com\/.  Foursquare. https:\/\/foursquare.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Google maps. https:\/\/maps.google.com\/.  Google maps. https:\/\/maps.google.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Zeit online: Betrayed by our own data. http:\/\/www.zeit.de\/digital\/datenschutz\/2011-03\/data-protection-malte-spitz.  Zeit online: Betrayed by our own data. http:\/\/www.zeit.de\/digital\/datenschutz\/2011-03\/data-protection-malte-spitz."},{"key":"e_1_3_2_1_4_1","volume-title":"Geo-indistinguishability: Differential privacy for location-based systems. CoRR, abs\/1212.1984","author":"Andres M. E.","year":"2012","unstructured":"M. E. Andres , N. E. Bordenabe , K. Chatzikokolakis , and C. Palamidessi . Geo-indistinguishability: Differential privacy for location-based systems. CoRR, abs\/1212.1984 , 2012 . M. E. Andres, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. CoRR, abs\/1212.1984, 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/977405.978634"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.33"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.69"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-540-72037-9_8","volume-title":"Pervasive Computing","author":"Krumm J.","year":"2007","unstructured":"J. Krumm . Inference attacks on location tracks . In A. LaMarca, M. Langheinrich, and K. Truong, editors, Pervasive Computing , volume 4480 of LNCS , pages 127 -- 143 . Springer Berlin Heidelberg , 2007 . J. Krumm. Inference attacks on location tracks. In A. LaMarca, M. Langheinrich, and K. Truong, editors, Pervasive Computing, volume 4480 of LNCS, pages 127--143. Springer Berlin Heidelberg, 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1626536.1626540"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"F. G.\n      Olumofin P. K.\n      Tysowski I.\n      Goldberg and \n      U.\n      Hengartner\n  . \n  Achieving efficient query privacy for location based services\n  . In M. J. Atallah and N. J. Hopper editors 10th International Privacy Enhancing Technologies Symposium PETS\n  2010 volume \n  6205\n   of \n  LNCS pages \n  93\n  --\n  110\n  . \n  Springer 2010.   F. G. Olumofin P. K. Tysowski I. Goldberg and U. Hengartner. Achieving efficient query privacy for location based services. In M. J. Atallah and N. J. Hopper editors 10th International Privacy Enhancing Technologies Symposium PETS 2010 volume 6205 of LNCS pages 93--110. Springer 2010.","DOI":"10.1007\/978-3-642-14527-8_6"},{"key":"e_1_3_2_1_19_1","volume-title":"Feb.","author":"Piorkowski M.","year":"2009","unstructured":"M. Piorkowski , N. Sarajanovic-Djukic , and M. Grossglauser . CRAWDAD data set epfl\/mobility (v. 2009-02--24). Downloaded from http:\/\/crawdad.cs.dartmouth.edu\/epfl\/mobility , Feb. 2009 . M. Piorkowski, N. Sarajanovic-Djukic, and M. Grossglauser. CRAWDAD data set epfl\/mobility (v. 2009-02--24). Downloaded from http:\/\/crawdad.cs.dartmouth.edu\/epfl\/mobility, Feb. 2009."},{"key":"e_1_3_2_1_20_1","volume-title":"3rd Hot Topics in Privacy Enhancing Technologies (HotPETs)","author":"Shokri R.","year":"2010","unstructured":"R. Shokri , J. Freudiger , and J.-P. Hubaux . A unified framework for location privacy . 3rd Hot Topics in Privacy Enhancing Technologies (HotPETs) , 2010 . R. Shokri, J. Freudiger, and J.-P. Hubaux. A unified framework for location privacy. 3rd Hot Topics in Privacy Enhancing Technologies (HotPETs), 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_22_1","first-page":"57","volume-title":"11th International Symposium Privacy Enhancing Technologies, PETS 2011, LNCS","author":"Shokri R.","year":"2011","unstructured":"R. Shokri , G. Theodorakopoulos , G. Danezis , J.-P. Hubaux , and J.-Y. L. Boudec . Quantifying location privacy: The case of sporadic location exposure. In S. Fischer-Hubner and N. Hopper, editors , 11th International Symposium Privacy Enhancing Technologies, PETS 2011, LNCS , pages 57 -- 76 . Springer , 2011 . R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, and J.-Y. L. Boudec. Quantifying location privacy: The case of sporadic location exposure. In S. Fischer-Hubner and N. Hopper, editors, 11th International Symposium Privacy Enhancing Technologies, PETS 2011, LNCS, pages 57--76. Springer, 2011."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866936"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195577"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517840.2517853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:14Z","timestamp":1750232054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":26,"alternative-id":["10.1145\/2517840.2517853","10.1145\/2517840"],"URL":"https:\/\/doi.org\/10.1145\/2517840.2517853","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}