{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:47Z","timestamp":1750308587477,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,10]],"date-time":"2015-10-10T00:00:00Z","timestamp":1444435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,10]]},"DOI":"10.1145\/2885990.2886005","type":"proceedings-article","created":{"date-parts":[[2016,3,8]],"date-time":"2016-03-08T14:13:39Z","timestamp":1457446419000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An investigation of privacy protocols in location-based service"],"prefix":"10.1145","author":[{"given":"Crystal","family":"Williams","sequence":"first","affiliation":[{"name":"Florida Agricultural and Mechanical University, Tallahassee, FL"}]},{"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[{"name":"Florida Agricultural and Mechanical University, Tallahassee, FL"}]}],"member":"320","published-online":{"date-parts":[[2015,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197514"},{"volume-title":"23--36","year":"2001","author":"Boudot F.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Narayanan Arvind Narendran Thiagarajan Mugdha Lakhani Michael Hamburg and Dan Boneh. \"Location Privacy via Private Proximity Testing.\" In NDSS. 2011.  Narayanan Arvind Narendran Thiagarajan Mugdha Lakhani Michael Hamburg and Dan Boneh. \"Location Privacy via Private Proximity Testing.\" In NDSS. 2011."},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Efficient private matching and set intersection","author":"Freedman Michael J","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT"},{"volume-title":"Proceedings of the 37th Hawaii International Conference on System Sciences.","year":"2004","author":"Hyungjick Lee Jim","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"volume-title":"Proceedings of 10th IEEE Global Internet Symposium (GI '07) in conjunction with IEEE INFOCOM 2007","year":"2007","author":"Stephan Krause","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Christian S. Jensen and Anders Friis-christensen and Torben B. Pedersen and Dieter Pfoser and Nectaria Tryfona Location-Based Services---A Database Perspective  Christian S. Jensen and Anders Friis-christensen and Torben B. Pedersen and Dieter Pfoser and Nectaria Tryfona Location-Based Services---A Database Perspective"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.87"},{"key":"e_1_3_2_1_11_1","unstructured":"Sheng Zhong and Li (Erran) Li and Yanbin Grace Liu and Yang Richard YangPrivacy-preserving location based services for mobile users in wireless networks 2004  Sheng Zhong and Li (Erran) Li and Yanbin Grace Liu and Yang Richard YangPrivacy-preserving location based services for mobile users in wireless networks 2004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.45"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.247"},{"issue":"8","key":"e_1_3_2_1_14_1","first-page":"1991","article-title":"Privacy-Preserving Location Assurance Protocols for Mobile Applications","volume":"9","author":"Wua Genqiang","year":"2014","journal-title":"JOURNAL OF SOFTWARE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.40"},{"key":"e_1_3_2_1_16_1","unstructured":"Android Studio http:\/\/developer.android.com\/sdk\/index.html  Android Studio http:\/\/developer.android.com\/sdk\/index.html"}],"event":{"name":"INFOSECCD '15: Information Security Curriculum Development Conference","sponsor":["KSU Kennesaw State University","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"INFOSECCD '15"},"container-title":["Proceedings of the 2015 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2885990.2886005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2885990.2886005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:15Z","timestamp":1750273515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2885990.2886005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,10]]},"references-count":16,"alternative-id":["10.1145\/2885990.2886005","10.1145\/2885990"],"URL":"https:\/\/doi.org\/10.1145\/2885990.2886005","relation":{},"subject":[],"published":{"date-parts":[[2015,10,10]]},"assertion":[{"value":"2015-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}