{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:06:15Z","timestamp":1730318775197,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Grants Council, Hong Kong","award":["Early Career Award"]},{"name":"Research Grants Council Hong Kong","award":["14201914"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,18]]},"DOI":"10.1145\/3098243.3098245","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T20:03:43Z","timestamp":1499976223000},"page":"163-172","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Geosocial query with user-controlled privacy"],"prefix":"10.1145","author":[{"given":"Peizhao","family":"Hu","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"Sherman S. M.","family":"Chow","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Asma","family":"Aloufi","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.10.013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"volume-title":"Homomorphic Computation of Edit Distance. In Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC). ACM","year":"2015","author":"Cheon Jung Hee","key":"e_1_3_2_1_8_1"},{"volume-title":"Network and Distributed System Security Symposium (NDSS).","year":"2009","author":"Chow Sherman S. M.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Taher El Gamal. 1985. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO. Springer-Verlag New York Inc. Santa Barbara California USA 10--18. Taher El Gamal. 1985. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO. Springer-Verlag New York Inc. Santa Barbara California USA 10--18.","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_3_2_1_13_1","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. (2012). Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. (2012)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"volume-title":"Proceeding of Win-ITS'07.","author":"Freudiger Julien","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/280277.280279"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.81"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In CRYPTO. Springer 554--571. Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In CRYPTO. Springer 554--571.","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.04.006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCSPW.2016.7509556"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Peizhao Hu Tamalika Mukherjee Alagu Valliappan and Stanislaw Radziszowski. 2016. Homomorphic Proximity Computation in Geosocial Networks. In BigSecurity an INFOCOM workshop. Peizhao Hu Tamalika Mukherjee Alagu Valliappan and Stanislaw Radziszowski. 2016. Homomorphic Proximity Computation in Geosocial Networks. In BigSecurity an INFOCOM workshop.","DOI":"10.1109\/INFCOMW.2016.7562150"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ali Khoshgozaran and Cyrus Shahabi. 2007. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In SSTD. Springer-Verlag 239--257. Ali Khoshgozaran and Cyrus Shahabi. 2007. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In SSTD. Springer-Verlag 239--257.","DOI":"10.1007\/978-3-540-73540-3_14"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.337"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"volume-title":"AfricaCrypt","author":"Lepoint Tancrede","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0213-7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"volume-title":"Network and Distributed System Security Symposium (NDSS).","year":"2011","author":"Narayanan Arvind","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197514"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_10"},{"volume-title":"Achieving Efficient Query Privacy for Location Based Services. In Privacy Enhancing Technologies Symposium (PETS). Springer-Verlag, 93--110","year":"2010","author":"Olumofin Femi","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","first-page":"14","article-title":"Privacy Preserving for Location-Based Services Using Location Transformation","volume":"2","author":"Peng Tao","year":"2013","journal-title":"CSS 8300, Chap."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.247"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462115"},{"key":"e_1_3_2_1_37_1","unstructured":"Joe Schwartz. 2012. Bing Maps Tile System. https:\/\/msdn.microsoft.com\/en-us\/library\/bb259689.aspx. (2012). Joe Schwartz. 2012. Bing Maps Tile System. https:\/\/msdn.microsoft.com\/en-us\/library\/bb259689.aspx. (2012)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.29"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Boyang Wang Ming Li Sherman S. M. Chow and Hui Li. 2014. A tale of two clouds: Computing on data encrypted under multiple keys. In IEEE Communications and Network Security (CNS). 337--345. Boyang Wang Ming Li Sherman S. M. Chow and Hui Li. 2014. A tale of two clouds: Computing on data encrypted under multiple keys. In IEEE Communications and Network Security (CNS). 337--345.","DOI":"10.1109\/CNS.2014.6997502"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Tao Zhang Sherman S. M. Chow Zhe Zhou and Ming Li. 2016. Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. In Advances in Information and Computer Security (IWSEC). 215--233. Tao Zhang Sherman S. M. Chow Zhe Zhou and Ming Li. 2016. Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. In Advances in Information and Computer Security (IWSEC). 215--233.","DOI":"10.1007\/978-3-319-44524-3_13"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Ge Zhong Ian Goldberg and Urs Hengartner. 2007. Louis Lester and Pierre - Three Protocols for Location Privacy. In Privacy Enhancing Technologies. 62--76. Ge Zhong Ian Goldberg and Urs Hengartner. 2007. Louis Lester and Pierre - Three Protocols for Location Privacy. In Privacy Enhancing Technologies. 62--76.","DOI":"10.1007\/978-3-540-75551-7_5"}],"event":{"name":"WiSec '17: 10th ACM Conference on Security & Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","NSF National Science Foundation","ACM Association for Computing Machinery"],"location":"Boston Massachusetts","acronym":"WiSec '17"},"container-title":["Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098243.3098245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T01:17:54Z","timestamp":1672967874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098243.3098245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"references-count":41,"alternative-id":["10.1145\/3098243.3098245","10.1145\/3098243"],"URL":"https:\/\/doi.org\/10.1145\/3098243.3098245","relation":{},"subject":[],"published":{"date-parts":[[2017,7,18]]},"assertion":[{"value":"2017-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}