{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:34Z","timestamp":1750306474521,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T00:00:00Z","timestamp":1446508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,3]]},"DOI":"10.1145\/2830834.2830839","type":"proceedings-article","created":{"date-parts":[[2016,7,5]],"date-time":"2016-07-05T12:23:45Z","timestamp":1467721425000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["PrAd"],"prefix":"10.1145","author":[{"given":"Hung","family":"Dang","sequence":"first","affiliation":[{"name":"School of Computing, National University of Singapore"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Computing, National University of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2015,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"e_1_3_2_1_4_1","unstructured":"M. F. Mokbel C.-Y. Chow and W. G. Aref \"The new casper: Query processing for location services without compromising privacy \" VLDB '06.   M. F. Mokbel C.-Y. Chow and W. G. Aref \"The new casper: Query processing for location services without compromising privacy \" VLDB '06."},{"key":"e_1_3_2_1_5_1","unstructured":"A. Khoshgozaran and C. Shahabi \"Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy \" SSTD'07.   A. Khoshgozaran and C. Shahabi \"Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy \" SSTD'07."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0169-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0286-z"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920920"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"B. Chor O. Goldreich E. Kushilevitz and M. Sudan \"Private information retrieval \" 1997.  B. Chor O. Goldreich E. Kushilevitz and M. Sudan \"Private information retrieval \" 1997.","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_10_1","unstructured":"M. c and S. Nath \"Privacy-aware personalization for mobile advertising \" CCS '12.  M. c and S. Nath \"Privacy-aware personalization for mobile advertising \" CCS '12."},{"key":"e_1_3_2_1_11_1","unstructured":"D. Davidson and B. Livshits \"Morepriv: Mobile os support for application personalization and privacy \" tech. rep. May 2012.  D. Davidson and B. Livshits \"Morepriv: Mobile os support for application personalization and privacy \" tech. rep. May 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163273.2163277"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.38"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_16_1","unstructured":"E. Kushilevitz and R. Ostrovsky \"Replication is not needed: Single database computationally-private information retrieval \" FOCS '97.   E. Kushilevitz and R. Ostrovsky \"Replication is not needed: Single database computationally-private information retrieval \" FOCS '97."},{"key":"e_1_3_2_1_17_1","unstructured":"D. Asonov and J.-C. Freytag \"Almost optimal private information retrieval \" PET'02.   D. Asonov and J.-C. Freytag \"Almost optimal private information retrieval \" PET'02."},{"key":"e_1_3_2_1_18_1","unstructured":"A. Iliev and S. Smith \"Private information storage with logarithmic-space secure hardware \" I-NetSec 04 2004.  A. Iliev and S. Smith \"Private information storage with logarithmic-space secure hardware \" I-NetSec 04 2004."},{"key":"e_1_3_2_1_19_1","unstructured":"\"Ibm 4764 pci-x cryptographic coprocessor.\" http:\/\/www-03.ibm.com\/security\/cryptocards\/pcixcc\/overview.shtml.  \"Ibm 4764 pci-x cryptographic coprocessor.\" http:\/\/www-03.ibm.com\/security\/cryptocards\/pcixcc\/overview.shtml."},{"key":"e_1_3_2_1_20_1","unstructured":"\"Software guard extensions programming reference.\" https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf.  \"Software guard extensions programming reference.\" https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf."},{"key":"e_1_3_2_1_21_1","unstructured":"D. Hilbert Mathematische Annalen 1891.  D. Hilbert Mathematische Annalen 1891."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2101062"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_5"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863960"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2252011"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"e_1_3_2_1_28_1","unstructured":"R. Sion \"On the computational practicality of private information retrieval \" in NDSS'07 2007.  R. Sion \"On the computational practicality of private information retrieval \" in NDSS'07 2007."},{"key":"e_1_3_2_1_29_1","unstructured":"J. Trostle and A. Parrish \"Efficient computationally private information retrieval from anonymity or trapdoor groups \" ISC'10.   J. Trostle and A. Parrish \"Efficient computationally private information retrieval from anonymity or trapdoor groups \" ISC'10."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_13"},{"key":"e_1_3_2_1_31_1","unstructured":"V. Toubiana H. Nissenbaum A. Narayanan S. Barocas and D. Boneh \"Adnostic: Privacy preserving targeted advertising \" 2010.  V. Toubiana H. Nissenbaum A. Narayanan S. Barocas and D. Boneh \"Adnostic: Privacy preserving targeted advertising \" 2010."},{"key":"e_1_3_2_1_32_1","unstructured":"S. Guha B. Cheng and P. Francis \"Privad: Practical privacy in online advertising \" NSDI'11.   S. Guha B. Cheng and P. Francis \"Privad: Practical privacy in online advertising \" NSDI'11."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"A. Juels \"Targeted advertising ... and privacy too \" CT-RSA 2001.   A. Juels \"Targeted advertising ... and privacy too \" CT-RSA 2001.","DOI":"10.1007\/3-540-45353-9_30"},{"key":"e_1_3_2_1_34_1","unstructured":"M. Fredrikson and B. Livshits \"Repriv: Re-envisioning in-browser privacy.\"  M. Fredrikson and B. Livshits \"Repriv: Re-envisioning in-browser privacy.\""},{"key":"e_1_3_2_1_35_1","unstructured":"S. Nath F. X. Lin J. Padhye and L. Ravindranath \"Smartads: Bringing contextual ads to mobile apps.\"  S. Nath F. X. Lin J. Padhye and L. Ravindranath \"Smartads: Bringing contextual ads to mobile apps.\""},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859993"}],"event":{"name":"SIGSPATIAL'15: 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Bellevue WA USA","acronym":"SIGSPATIAL'15"},"container-title":["Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2830834.2830839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2830834.2830839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2830834.2830839"}},"subtitle":["Enabling Privacy-Aware Location based Advertising"],"short-title":[],"issued":{"date-parts":[[2015,11,3]]},"references-count":36,"alternative-id":["10.1145\/2830834.2830839","10.1145\/2830834"],"URL":"https:\/\/doi.org\/10.1145\/2830834.2830839","relation":{},"subject":[],"published":{"date-parts":[[2015,11,3]]},"assertion":[{"value":"2015-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}