{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:41Z","timestamp":1750306301607,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T00:00:00Z","timestamp":1458604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,22]]},"DOI":"10.1145\/2896387.2896445","type":"proceedings-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T13:54:08Z","timestamp":1461333248000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Aman"],"prefix":"10.1145","author":[{"given":"Hiba","family":"Jadallah","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Sharjah, Sharjah, UAE"}]},{"given":"Zaher","family":"Al Aghbari","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Sharjah, Sharjah, UAE"}]}],"member":"320","published-online":{"date-parts":[[2016,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2010.82"},{"key":"e_1_3_2_1_2_1","first-page":"763","volume-title":"Proc. of the 32nd International Conference on Very Large Data Bases","author":"Mokbel M. F.","year":"2006","unstructured":"M. F. Mokbel , C.-Y. Chow , and W. G. Aref . \" The new casper: query processing for location services without compromising privacy \". In Proc. of the 32nd International Conference on Very Large Data Bases , pages 763 -- 774 . VLDB Endowment , 2006 . M. F. Mokbel, C.-Y. Chow, and W. G. Aref. \"The new casper: query processing for location services without compromising privacy\". In Proc. of the 32nd International Conference on Very Large Data Bases, pages 763--774. VLDB Endowment, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245379"},{"key":"e_1_3_2_1_5_1","volume-title":"Mobicache: When k-anonymity meets cache,\" in Proc. of IEEE GLOBECOM","author":"Zhu X.","year":"2013","unstructured":"X. Zhu , H. Chi , B. Niu , W. Zhang , Z. Li , and H. Li , \" Mobicache: When k-anonymity meets cache,\" in Proc. of IEEE GLOBECOM 2013 . X. Zhu, H. Chi, B. Niu, W. Zhang, Z. Li, and H. Li, \"Mobicache: When k-anonymity meets cache,\" in Proc. of IEEE GLOBECOM 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"Achieving k-anonymity in privacy-aware location-based services,\" in Proc. of IEEE INFOCOM","author":"Niu B.","year":"2014","unstructured":"B. Niu , Q. Li , X. Zhu , G. Cao , and H. Li , \" Achieving k-anonymity in privacy-aware location-based services,\" in Proc. of IEEE INFOCOM 2014 . B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, \"Achieving k-anonymity in privacy-aware location-based services,\" in Proc. of IEEE INFOCOM 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"e_1_3_2_1_8_1","volume-title":"Mobihide: A mobilea peerto-peer system for anonymous location-based queries,\" in Proc. of ACM SSTD","author":"Ghinita G.","year":"2007","unstructured":"G. Ghinita , P. Kalnis , and S. Skiadopoulos , \" Mobihide: A mobilea peerto-peer system for anonymous location-based queries,\" in Proc. of ACM SSTD 2007 . G. Ghinita, P. Kalnis, and S. Skiadopoulos, \"Mobihide: A mobilea peerto-peer system for anonymous location-based queries,\" in Proc. of ACM SSTD 2007."},{"key":"e_1_3_2_1_9_1","first-page":"88","volume-title":"An anonymous communication technique using dummies for location-based services,\" in Proc. of IEEE ICPS","author":"Kido H.","year":"2005","unstructured":"H. Kido , Y. Yanagisawa , and T. Satoh , \" An anonymous communication technique using dummies for location-based services,\" in Proc. of IEEE ICPS , pp. 88 -- 97 , 2005 . H. Kido, Y. Yanagisawa, and T. Satoh, \"An anonymous communication technique using dummies for location-based services,\" in Proc. of IEEE ICPS, pp. 88--97, 2005."},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy in mobile computing for location-sharing-based services,\" in Proc. of ACM PETS","author":"Bilogrevic I.","year":"2011","unstructured":"I. Bilogrevic , M. Jadliwala , K. Kalkan , J.-P. Hubaux , and I. Aad , \" Privacy in mobile computing for location-sharing-based services,\" in Proc. of ACM PETS 2011 . I. Bilogrevic, M. Jadliwala, K. Kalkan, J.-P. Hubaux, and I. Aad, \"Privacy in mobile computing for location-sharing-based services,\" in Proc. of ACM PETS 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.29"},{"key":"e_1_3_2_1_12_1","volume-title":"A Fine-Grained Spatial Cloaking Scheme for Privacy-Aware Users in Location-Based Services,\" in Proc. of 24th ICCCN","author":"Niu B.","year":"2014","unstructured":"B. Niu , Q. Li , X. Zhu , and H. Li , \" A Fine-Grained Spatial Cloaking Scheme for Privacy-Aware Users in Location-Based Services,\" in Proc. of 24th ICCCN , 2014 . B. Niu, Q. Li, X. Zhu, and H. Li, \"A Fine-Grained Spatial Cloaking Scheme for Privacy-Aware Users in Location-Based Services,\" in Proc. of 24th ICCCN, 2014."},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/everywarelab.di.unimi.it\/lbs-datasim  http:\/\/everywarelab.di.unimi.it\/lbs-datasim"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_10"}],"event":{"name":"ICC '16: International Conference on Internet of things and Cloud Computing","acronym":"ICC '16","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the International Conference on Internet of things and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2896445","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896387.2896445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2896445"}},"subtitle":["Spatial Cloaking for Privacy-Aware Location-Based Queries in the Cloud"],"short-title":[],"issued":{"date-parts":[[2016,3,22]]},"references-count":14,"alternative-id":["10.1145\/2896387.2896445","10.1145\/2896387"],"URL":"https:\/\/doi.org\/10.1145\/2896387.2896445","relation":{},"subject":[],"published":{"date-parts":[[2016,3,22]]},"assertion":[{"value":"2016-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}