{"id":"https://openalex.org/W2888807229","doi":"https://doi.org/10.1109/wowmom.2018.8449799","title":"A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection","display_name":"A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2888807229","doi":"https://doi.org/10.1109/wowmom.2018.8449799","mag":"2888807229"},"language":"en","primary_location":{"id":"doi:10.1109/wowmom.2018.8449799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2018.8449799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 19th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024303799","display_name":"Cihan Eryonucu","orcid":"https://orcid.org/0000-0003-4761-7676"},"institutions":[{"id":"https://openalex.org/I168864056","display_name":"Bilkent University","ror":"https://ror.org/02vh8a032","country_code":"TR","type":"education","lineage":["https://openalex.org/I168864056"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Cihan Eryonucu","raw_affiliation_strings":["Bilkent University, Computer Engineering Department, Ankara, Turkey","Computer Engineering Department, Bilkent University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Bilkent University, Computer Engineering Department, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]},{"raw_affiliation_string":"Computer Engineering Department, Bilkent University, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028326739","display_name":"Erman Ayday","orcid":"https://orcid.org/0000-0003-3383-1081"},"institutions":[{"id":"https://openalex.org/I168864056","display_name":"Bilkent University","ror":"https://ror.org/02vh8a032","country_code":"TR","type":"education","lineage":["https://openalex.org/I168864056"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Erman Ayday","raw_affiliation_strings":["Bilkent University, Computer Engineering Department, Ankara, Turkey","Computer Engineering Department, Bilkent University, Ankara, Turkey"],"affiliations":[{"raw_affiliation_string":"Bilkent University, Computer Engineering Department, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]},{"raw_affiliation_string":"Computer Engineering Department, Bilkent University, Ankara, Turkey","institution_ids":["https://openalex.org/I168864056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047991903","display_name":"Engin Zeydan","orcid":"https://orcid.org/0000-0003-3329-0588"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Engin Zeydan","raw_affiliation_strings":["Tiirk Telekom Labs, Istanbul, 34889, Turkey","Tiirk Telekom Labs, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Tiirk Telekom Labs, Istanbul, 34889, Turkey","institution_ids":[]},{"raw_affiliation_string":"Tiirk Telekom Labs, Istanbul, Turkey","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024303799"],"corresponding_institution_ids":["https://openalex.org/I168864056"],"apc_list":null,"apc_paid":null,"fwci":0.4887,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72898024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7960257530212402},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7560083866119385},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.6639409065246582},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.5775181651115417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5677309036254883},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.5472376942634583},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5355809330940247},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4796229302883148},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.4597926139831543},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4481729567050934},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4461284875869751},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4242761731147766},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.41590696573257446},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36114054918289185},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35700711607933044},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.33607417345046997},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2594423294067383},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22136270999908447},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1744735836982727},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14600339531898499},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.1258760690689087}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7960257530212402},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7560083866119385},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.6639409065246582},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.5775181651115417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5677309036254883},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.5472376942634583},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5355809330940247},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4796229302883148},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.4597926139831543},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4481729567050934},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4461284875869751},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4242761731147766},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.41590696573257446},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36114054918289185},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35700711607933044},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.33607417345046997},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2594423294067383},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22136270999908447},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1744735836982727},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14600339531898499},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.1258760690689087},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wowmom.2018.8449799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2018.8449799","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 19th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.bilkent.edu.tr:11693/50292","is_oa":false,"landing_page_url":"http://hdl.handle.net/11693/50292","pdf_url":null,"source":{"id":"https://openalex.org/S4306400079","display_name":"Bilkent University Institutional Repository (Bilkent University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I168864056","host_organization_name":"Bilkent University","host_organization_lineage":["https://openalex.org/I168864056"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2018 IEEE 19th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2606552554"],"related_works":["https://openalex.org/W4323528671","https://openalex.org/W4386820853","https://openalex.org/W4238582915","https://openalex.org/W2094069016","https://openalex.org/W1575311728","https://openalex.org/W2369575317","https://openalex.org/W4212859770","https://openalex.org/W3036675567","https://openalex.org/W4390887375","https://openalex.org/W1484081998"],"abstract_inverted_index":{"In":[0,63,85],"recent":[1],"years,":[2],"service":[3,44],"providers,":[4],"such":[5,29,76],"as":[6,30],"mobile":[7,25],"operators":[8],"providing":[9],"wireless":[10],"services,":[11],"collected":[12],"location":[13,37],"data":[14,51],"in":[15,93],"enormous":[16],"extent":[17],"with":[18],"the":[19,22,53,58],"increase":[20],"of":[21,24,57,101],"usages":[23],"phones.":[26],"Vertical":[27],"businesses,":[28],"banks,":[31],"may":[32],"want":[33],"to":[34,52],"use":[35],"this":[36,64],"information":[38],"for":[39],"their":[40],"own":[41],"scenarios.":[42],"However,":[43],"providers":[45],"cannot":[46],"directly":[47],"provide":[48],"these":[49],"private":[50],"vertical":[54],"businesses":[55],"because":[56],"privacy":[59,69],"and":[60,96,99],"legal":[61],"issues.":[62],"demo,":[65],"we":[66,88],"show":[67],"how":[68],"preserving":[70],"solutions":[71],"can":[72],"be":[73],"utilized":[74],"using":[75],"location-based":[77],"queries":[78],"without":[79],"revealing":[80],"each":[81],"organization's":[82],"sensitive":[83],"data.":[84],"our":[86,94,102],"demonstration,":[87],"used":[89],"partially":[90],"homomorphic":[91],"cryptosystem":[92],"protocols":[95],"showed":[97],"practicality":[98],"feasibility":[100],"proposed":[103],"solution.":[104]},"counts_by_year":[{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
