{"id":"https://openalex.org/W2026857761","doi":"https://doi.org/10.1109/pst.2013.6596032","title":"Selective cloaking: Need-to-know for location-based apps","display_name":"Selective cloaking: Need-to-know for location-based apps","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2026857761","doi":"https://doi.org/10.1109/pst.2013.6596032","mag":"2026857761"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2013.6596032","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2013.6596032","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Eleventh Annual Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047869381","display_name":"Benjamin Henne","orcid":null},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Benjamin Henne","raw_affiliation_strings":["Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]},{"raw_affiliation_string":"Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086253985","display_name":"Christian Kater","orcid":null},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Kater","raw_affiliation_strings":["Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]},{"raw_affiliation_string":"Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000498964","display_name":"Matthew Smith","orcid":"https://orcid.org/0000-0002-2724-1379"},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthew Smith","raw_affiliation_strings":["Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]},{"raw_affiliation_string":"Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081969961","display_name":"Michael Brenner","orcid":"https://orcid.org/0000-0003-2690-7340"},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Brenner","raw_affiliation_strings":["Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Distributed Computing & Security Group, Leibniz Universit\u00e4t Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]},{"raw_affiliation_string":"Distrib. Comput. & Security Group, Leibniz Univ., Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047869381"],"corresponding_institution_ids":["https://openalex.org/I114112103"],"apc_list":null,"apc_paid":null,"fwci":1.596,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.83307954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.942245364189148},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7842668294906616},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6967991590499878},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.6725990772247314},{"id":"https://openalex.org/keywords/cloaking","display_name":"Cloaking","score":0.6690390706062317},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5421136617660522},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5112555027008057},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4910111725330353},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.48005211353302},{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.47625160217285156},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4622703492641449},{"id":"https://openalex.org/keywords/location-data","display_name":"Location data","score":0.45237573981285095},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4454871416091919},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44222527742385864},{"id":"https://openalex.org/keywords/location-awareness","display_name":"Location awareness","score":0.41491204500198364},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3230966031551361},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09360456466674805},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08810034394264221}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.942245364189148},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7842668294906616},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6967991590499878},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.6725990772247314},{"id":"https://openalex.org/C62973154","wikidata":"https://www.wikidata.org/wiki/Q868018","display_name":"Cloaking","level":3,"score":0.6690390706062317},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5421136617660522},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5112555027008057},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4910111725330353},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.48005211353302},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.47625160217285156},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4622703492641449},{"id":"https://openalex.org/C2988186277","wikidata":"https://www.wikidata.org/wiki/Q5915793","display_name":"Location data","level":2,"score":0.45237573981285095},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4454871416091919},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44222527742385864},{"id":"https://openalex.org/C2776104089","wikidata":"https://www.wikidata.org/wiki/Q15894079","display_name":"Location awareness","level":2,"score":0.41491204500198364},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3230966031551361},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09360456466674805},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08810034394264221},{"id":"https://openalex.org/C49040817","wikidata":"https://www.wikidata.org/wiki/Q193091","display_name":"Optoelectronics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C110367647","wikidata":"https://www.wikidata.org/wiki/Q497166","display_name":"Metamaterial","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2013.6596032","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2013.6596032","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Eleventh Annual Conference on Privacy, Security and Trust","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W114213397","https://openalex.org/W1459303179","https://openalex.org/W1902290876","https://openalex.org/W1963971515","https://openalex.org/W2044110164","https://openalex.org/W2079154980","https://openalex.org/W2086863233","https://openalex.org/W2096899416","https://openalex.org/W2107179184","https://openalex.org/W2107643854","https://openalex.org/W2117691115","https://openalex.org/W2120911939","https://openalex.org/W2124020982","https://openalex.org/W2143331350","https://openalex.org/W2153732062","https://openalex.org/W2157428377","https://openalex.org/W2158888459","https://openalex.org/W2170166043","https://openalex.org/W6641190993"],"related_works":["https://openalex.org/W1988993244","https://openalex.org/W1985243104","https://openalex.org/W4311991908","https://openalex.org/W3004592867","https://openalex.org/W2981007352","https://openalex.org/W2027078869","https://openalex.org/W4246681749","https://openalex.org/W2079833280","https://openalex.org/W2026857761","https://openalex.org/W2011463788"],"abstract_inverted_index":{"Currently":[0],"location":[1,20,28,36,61,86,104,153,173,183,189],"privacy":[2,70,93,134,146,184],"settings":[3],"of":[4,13,19,79,81,115,121,172,196],"mobile":[5,69],"operating":[6],"systems":[7],"are":[8],"limited":[9],"to":[10,41,67,92,101,128,163,168,178],"the":[11,17,58,75,112,118,160,170,201],"option":[12],"enabling":[14],"or":[15,22],"disabling":[16],"use":[18,29,95,120,129],"completely":[21],"on":[23,74],"a":[24,62,182],"per-app":[25,188],"basis.":[26],"When":[27],"is":[30,176],"allowed,":[31],"users":[32,98,167],"always":[33],"reveal":[34],"their":[35,103],"in":[37,94,108,154],"full":[38,109],"precision":[39],"even":[40],"apps":[42,52,55],"that":[43,175,186],"do":[44,99,140],"not":[45,90,107,141],"need":[46],"it.":[47],"For":[48],"instance,":[49],"weather":[50],"forecast":[51],"and":[53,77,209,212],"navigation":[54],"both":[56,206],"get":[57],"most":[59],"exact":[60,143],"device":[63],"can":[64,147],"determine.":[65],"Up":[66],"now,":[68],"research":[71],"was":[72],"focused":[73],"recognition":[76],"prevention":[78],"disclosure":[80],"private":[82],"data.":[83],"This":[84],"includes":[85],"data,":[87],"but":[88,106,132],"does":[89],"extend":[91],"cases":[96],"where":[97],"want":[100,127],"disclose":[102],"-":[105],"detail.":[110],"However,":[111],"increasing":[113,119],"adoption":[114],"smartphones":[116],"entails":[117],"location-based":[122,138],"services":[123,139],"as":[124,157],"well.":[125],"Users":[126],"these":[130],"services,":[131],"have":[133],"concerns.":[135],"As":[136],"many":[137],"require":[142],"locations,":[144],"user":[145],"be":[148],"increased":[149],"by":[150],"only":[151],"disclosing":[152],"such":[155],"detail":[156],"required":[158],"for":[159],"respective":[161],"service":[162],"function.":[164],"To":[165],"enable":[166],"restrict":[169],"accuracy":[171],"data":[174],"revealed":[177],"apps,":[179],"we":[180],"created":[181],"framework":[185,192],"allows":[187,193],"obfuscation.":[190],"The":[191],"easy":[194],"integration":[195],"different":[197],"obfuscation":[198,208,211],"algorithms":[199],"into":[200],"Android":[202],"system.":[203],"We":[204],"present":[205],"on-device":[207],"service-based":[210],"evaluate":[213],"our":[214],"framework.":[215]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
