{"id":"https://openalex.org/W2035921576","doi":"https://doi.org/10.1109/percomw.2012.6197514","title":"Location privacy via actively secure private proximity testing","display_name":"Location privacy via actively secure private proximity testing","publication_year":2012,"publication_date":"2012-03-01","ids":{"openalex":"https://openalex.org/W2035921576","doi":"https://doi.org/10.1109/percomw.2012.6197514","mag":"2035921576"},"language":"en","primary_location":{"id":"doi:10.1109/percomw.2012.6197514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percomw.2012.6197514","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007632211","display_name":"Janus Dam Nielsen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163711","display_name":"Alexandra Institute (Denmark)","ror":"https://ror.org/054z83b16","country_code":"DK","type":"company","lineage":["https://openalex.org/I4210163711"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Janus Dam Nielsen","raw_affiliation_strings":["The Alexandra Institute, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"The Alexandra Institute, Aarhus, Denmark","institution_ids":["https://openalex.org/I4210163711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004568771","display_name":"Jakob Pagter","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163711","display_name":"Alexandra Institute (Denmark)","ror":"https://ror.org/054z83b16","country_code":"DK","type":"company","lineage":["https://openalex.org/I4210163711"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Jakob Illeborg Pagter","raw_affiliation_strings":["The Alexandra Institute, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"The Alexandra Institute, Aarhus, Denmark","institution_ids":["https://openalex.org/I4210163711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091696452","display_name":"Michael Stausholm","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163711","display_name":"Alexandra Institute (Denmark)","ror":"https://ror.org/054z83b16","country_code":"DK","type":"company","lineage":["https://openalex.org/I4210163711"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Michael Bladt Stausholm","raw_affiliation_strings":["The Alexandra Institute, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"The Alexandra Institute, Aarhus, Denmark","institution_ids":["https://openalex.org/I4210163711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007632211"],"corresponding_institution_ids":["https://openalex.org/I4210163711"],"apc_list":null,"apc_paid":null,"fwci":5.9941,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.9611678,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7450641393661499},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6995571255683899},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6189545392990112},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.5443347096443176},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.471861332654953},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4525649845600128},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4516626000404358},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4350472092628479},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4232349991798401},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.4225867986679077},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3162960708141327},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08008655905723572}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7450641393661499},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6995571255683899},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6189545392990112},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.5443347096443176},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.471861332654953},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4525649845600128},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4516626000404358},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4350472092628479},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4232349991798401},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.4225867986679077},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3162960708141327},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08008655905723572},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/percomw.2012.6197514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percomw.2012.6197514","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1532961226","https://openalex.org/W1548880861","https://openalex.org/W1554259298","https://openalex.org/W1595357546","https://openalex.org/W1754309194","https://openalex.org/W1979215153","https://openalex.org/W1984786275","https://openalex.org/W1987758794","https://openalex.org/W2025181331","https://openalex.org/W2031573294","https://openalex.org/W2108834246","https://openalex.org/W2153193245","https://openalex.org/W2156001253","https://openalex.org/W2171524843","https://openalex.org/W2224364690","https://openalex.org/W2233233025","https://openalex.org/W2284345771","https://openalex.org/W2394957549","https://openalex.org/W4232907381","https://openalex.org/W6636797535","https://openalex.org/W6647218697","https://openalex.org/W6682866549","https://openalex.org/W6712353128"],"related_works":["https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2076840701","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W2026856585","https://openalex.org/W1988007309"],"abstract_inverted_index":{"We":[0,66,90],"present":[1],"a":[2,54,75,93],"solution":[3,42],"which":[4],"improves":[5],"the":[6,69,98],"level":[7],"of":[8,19,24,56,77,100],"privacy":[9],"possible":[10,58],"in":[11,59],"location":[12,105],"based":[13,106],"services":[14],"(LBS).":[15],"A":[16],"core":[17],"component":[18],"LBS":[20],"is":[21,32,48],"proximity":[22,45,64],"testing":[23,46],"users.":[25],"Alice":[26],"wants":[27],"to":[28,34,84],"know":[29],"if":[30],"she":[31],"near":[33],"Bob":[35],"(or":[36],"generally":[37],"some":[38],"location).":[39],"The":[40],"presented":[41],"support":[43],"private":[44,63],"and":[47,96],"actively":[49],"secure":[50,88,101],"meaning":[51],"it":[52],"prevents":[53],"number":[55],"attacks":[57],"existing":[60,86],"protocols":[61],"for":[62,104],"testing.":[65],"demonstrate":[67],"that":[68],"improved":[70],"security":[71,94],"provided":[72],"only":[73],"implies":[74],"factor":[76],"two":[78],"penalty":[79],"on":[80],"execution":[81],"time":[82],"compared":[83],"an":[85],"passively":[87],"protocol.":[89],"also":[91],"provide":[92],"analysis":[95],"discuss":[97],"relevance":[99],"multiparty":[102],"computation":[103],"services.":[107]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
