{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T23:13:51Z","timestamp":1723331631057},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Key Laboratory of Aerospace Information Security and the Trusted Computing, Ministry of Education"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572380","61772383","61702379","61772405","61572220"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012336","name":"Major State Basic Research Development Program of China","doi-asserted-by":"crossref","award":["2014CB340600"],"id":[{"id":"10.13039\/501100012336","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2018,11,1]]},"DOI":"10.1109\/tmc.2018.2811481","type":"journal-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T19:29:41Z","timestamp":1519932581000},"page":"2524-2535","source":"Crossref","is-referenced-by-count":60,"title":["Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":false,"given":"Kun","family":"He","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0960-4447","authenticated-orcid":false,"given":"Min","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2653102"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721742"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2604820"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2593444"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2560812"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2315619"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.023"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"ref34","first-page":"119","article-title":"A generalisation, a simplification and some applications of paillier's probabilistic\n public-key system","author":"damg\u00e5rd","year":"2001","journal-title":"Proc Sixth Int l Workshop Theory and Practice in Public Key Cryptography Public Key Cryptography"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"ref27","first-page":"1008","article-title":"Personalized location privacy in mobile networks: A social group utility approach","author":"gong","year":"2015","journal-title":"Proc IEEE Conf Comput Commun"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2520473"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480418"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.87"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.03.016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536227"},{"key":"ref23","first-page":"186","article-title":"CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud","author":"wang","year":"2015","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2568460"},{"key":"ref25","first-page":"2760","article-title":"Search me if you can: Privacy-preserving location query service","author":"li","year":"2013","journal-title":"Proc INFOCOM"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2499791"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567111"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2016.03.002","article-title":"ABAKA: A novel attribute-based\n k-anonymous collaborative solution for LBSs","volume":"85","author":"dargahi","year":"2016","journal-title":"Comput Commun"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11428572_10","article-title":"A formal model of obfuscation and negotiation for location privacy","author":"duckham","year":"2005","journal-title":"Proc 3rd Int Conf Pervasive Comput"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223675"},{"key":"ref6","first-page":"382","article-title":"Quantifying location privacy leakage from transaction prices","author":"gervais","year":"2016","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2256890"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2669089"},{"key":"ref7","first-page":"3","article-title":"I Know Where You All Are!\n exploiting mobile social apps for large-scale location privacy probing","author":"zhao","year":"2016","journal-title":"Proc Australasian Conf Inf Security Privacy"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052696"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref46","first-page":"3012","article-title":"n-CD: A geometric approach to preserving location\n privacy in location-based services","author":"li","year":"2013","journal-title":"Proc INFOCOM"},{"key":"ref45","article-title":"A privacy-preserving location-based system for continuous spatial queries","volume":"2016","author":"song","year":"2016","journal-title":"Mobile Inf Syst"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2490021"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2624732"},{"key":"ref42","first-page":"47","article-title":"Location privacy protection through\n obfuscation-based techniques","author":"ardagna","year":"2007","journal-title":"Proc 21st Annu IFIP WG 11 3 Working Conf Data Appl Secur"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.269"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/8479320\/08305650.pdf?arnumber=8305650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:58:07Z","timestamp":1643194687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8305650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,1]]},"references-count":50,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2018.2811481","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,1]]}}}