{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:37:46Z","timestamp":1725910666328},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811063879"},{"type":"electronic","value":"9789811063886"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6388-6_47","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T14:13:30Z","timestamp":1505484810000},"page":"551-567","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The NCC: An Improved Anonymous Method for Location-Based Services Based on Casper"],"prefix":"10.1007","author":[{"given":"Wenqi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Mingyu","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Guangwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"key":"47_CR1","unstructured":"Zhao, D.P., Liang, L., Tian, X.X., et al.: Privacy protection in location based services: model and development (2015)"},{"issue":"9","key":"47_CR2","first-page":"2373","volume":"26","author":"XJ Zhang","year":"2015","unstructured":"Zhang, X.J., Gui, X.L., Wu, Z.D.: Privacy preservation for location-based services: a survey. J. Softw. 26(9), 2373\u20132395 (2015)","journal-title":"J. Softw."},{"issue":"1","key":"47_CR3","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10707-013-0192-0","volume":"18","author":"X Chen","year":"2014","unstructured":"Chen, X., Pang, J.: Protecting query privacy in location-based services. GeoInformatica 18(1), 95\u2013133 (2014)","journal-title":"GeoInformatica"},{"key":"47_CR4","unstructured":"199IT: 08\/09\/2015. \n http:\/\/www.199it.com\/archives\/381843.html"},{"key":"47_CR5","unstructured":"Sythoff, J., Morrison, J.: Location-based services: market forecast, 2011\u20132015. Pyramid Research (2011)"},{"issue":"2","key":"47_CR6","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/TPDS.2013.34","volume":"25","author":"R Dewri","year":"2014","unstructured":"Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374\u2013383 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"47_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TMC.2010.145","volume":"10","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F., He, T.: A privacy-preserving location monitoring system for wireless sensor networks. IEEE Trans. Mob. Comput. 10(1), 94\u2013107 (2011)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"47_CR8","first-page":"4604","volume":"6","author":"KP Kaliyamurthie","year":"2013","unstructured":"Kaliyamurthie, K.P., Parameswari, D., Udayakumar, R.: k-anonymity based privacy preserving for data collection in wireless sensor networks. Indian J. Sci. Technol. 6, 4604\u20134614 (2013)","journal-title":"Indian J. Sci. Technol."},{"issue":"3","key":"47_CR9","doi-asserted-by":"publisher","first-page":"196","DOI":"10.4103\/0256-4602.98861","volume":"29","author":"RS Zuberi","year":"2012","unstructured":"Zuberi, R.S., Ahmad, S.N., Lall, B.: Privacy protection through k-anonymity in location-based services. Iete Tech. Rev. 29(3), 196 (2012)","journal-title":"Iete Tech. Rev."},{"issue":"11","key":"47_CR10","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1002\/sec.1438","volume":"9","author":"M Xue","year":"2016","unstructured":"Xue, M., Liu, Y., Ross, K.W., et al.: Thwarting location privacy protection in location-based social discovery services. Secur. Commun. Netw. 9(11), 1496\u20131508 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"47_CR11","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/TPDS.2013.34","volume":"25","author":"R Dewri","year":"2014","unstructured":"Dewri, R., Thurimella, R.: Exploiting service similarity for privacy in location-based search queries. IEEE Trans. Parallel Distrib. Syst. 25(2), 374\u2013383 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"47_CR12","first-page":"24","volume":"34","author":"CY Chow","year":"2009","unstructured":"Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper: query processing for location services without compromising privacy. ACM Trans. Data base Syst. (TODS) 34(4), 24 (2009)","journal-title":"ACM Trans. Data base Syst. (TODS)"},{"key":"47_CR13","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G: The new casper: query processing for location services without compromising privacy. In: International Conference on Very Large Data Bases, DBLP, Seoul, Korea, pp. 763\u2013774, September 2006"},{"issue":"9","key":"47_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CC.2013.6623499","volume":"10","author":"B Niu","year":"2013","unstructured":"Niu, B., Zu, X.Y., Chi, T.H.: Pseudo-location updating system for privacy-preserving location-based services. China Commun. 10(9), 1\u201312 (2013)","journal-title":"China Commun."},{"issue":"12","key":"47_CR15","first-page":"276","volume":"38","author":"C Si","year":"2012","unstructured":"Si, C., Xu, H.Y.: Location privacy protection method based on V-grid model. Comput. Eng. 38(12), 276\u2013278 (2012)","journal-title":"Comput. Eng."},{"key":"47_CR16","first-page":"68","volume":"1","author":"SF Jin","year":"2014","unstructured":"Jin, S.F., Ye, Z.S., Song, H.: A similar quadtree based on location K-Anonymity algorithm. Trans. Beijing Inst. Technol. 1, 68\u201371 (2014)","journal-title":"Trans. Beijing Inst. Technol."},{"issue":"2","key":"47_CR17","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"HT Brink","year":"2002","unstructured":"Brink, H.T.: A framework for generating network based moving objects. GeoInformatica 6(2), 153\u2013180 (2002)","journal-title":"GeoInformatica"},{"key":"47_CR18","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"47_CR19","unstructured":"Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS (2005)"},{"key":"47_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/BFb0032349","volume-title":"Cryptography: Policy and Algorithms","author":"N Jefferies","year":"1996","unstructured":"Jefferies, N., Mitchell, C., Walker, M.: A proposed architecture for trusted third party services. In: Dawson, E., Goli\u0107, J. (eds.) CPA 1995. LNCS, vol. 1029, pp. 98\u2013104. Springer, Heidelberg (1996). doi:\n 10.1007\/BFb0032349"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Aggarwal, G., et al.: Vision paper: enabling privacy for the paranoids. In: VLDB (2004)","DOI":"10.1016\/B978-012088469-8\/50063-2"},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"47_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1\u201318 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"6","key":"47_CR24","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"47_CR25","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: Proceedings of the 16th International Conference on World Wide Web, pp. 371\u2013380 (2007)","DOI":"10.1145\/1242572.1242623"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6388-6_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T03:25:59Z","timestamp":1558409159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6388-6_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063879","9789811063886"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6388-6_47","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icycsee2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}