<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462019000401549</article-id>
<article-id pub-id-type="doi">10.13053/cys-23-4-3291</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Anonymity and Privacy Security Scheme on Location Based Services]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Aguirre Anaya]]></surname>
<given-names><![CDATA[Eleazar]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gallegos Garcia]]></surname>
<given-names><![CDATA[Gina]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Barboza García]]></surname>
<given-names><![CDATA[Miriam]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salinas Rosales]]></surname>
<given-names><![CDATA[Moisés]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Aguilar Torres]]></surname>
<given-names><![CDATA[Gualberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Escamilla Ambrosio]]></surname>
<given-names><![CDATA[Ponciano J.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación en Computación ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Politécnico Nacional Escuela Superior de Ingeniería Mecánica y Eléctrica ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Comisión Nacional de Seguridad  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<volume>23</volume>
<numero>4</numero>
<fpage>1549</fpage>
<lpage>1568</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462019000401549&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462019000401549&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462019000401549&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Anonymity and privacy are two security services frequently confused when schemes are designed. On the one hand, privacy refers to transform information in order to keep it from all but those who are authorized to have it. On the other hand, anonymity refers to a condition in which the information receiver does not know the sender's identity. From the Location Based Service (LBS) point of view, anonymity and privacy are security services very important to preserve, as sensitive data travel in a service request, for example the identity of participants and their location. Most of the related work focuses on protecting only one aspect of the LBS user letting secure only one aspect. in this paper we present a security scheme that consists on a set of cryptographic protocols which consider cryptographic primitives along with fake location information, in order to provide both identity anonymity and location privacy. The importance of this work relies on the fact that the proposed scheme remains transparent to the LBS provider. Moreover, the results obtained show that this approach focused on removing the trust from the LBS provider, did not represent an excessive increment on the cost and usage of the channel that makes our scheme a suitable and interesting improvement over previous works.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Anonymity]]></kwd>
<kwd lng="en"><![CDATA[cryptography]]></kwd>
<kwd lng="en"><![CDATA[location based services]]></kwd>
<kwd lng="en"><![CDATA[privacy]]></kwd>
<kwd lng="en"><![CDATA[scheme]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schiller]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Voisard]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Location-Based Services]]></source>
<year>2004</year>
<publisher-name><![CDATA[Morgan Kaufmann of Elsevier]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wernke]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Skvortsov]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dürr]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Rothermel]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A classification of location privacy attacks and approaches]]></article-title>
<source><![CDATA[Personal Ubiquitous Computing]]></source>
<year>2014</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>163-75</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zurbaran]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wightman-Rojas]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Labrador]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Survey on Privacy in Location-Based Services]]></article-title>
<source><![CDATA[Ingeniería y Desarrollo]]></source>
<year>2014</year>
<volume>32</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>314-43</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beresfor]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Stajano]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Location privacy in pervasive computing]]></article-title>
<source><![CDATA[IEEE Pervasive Computing]]></source>
<year>2003</year>
<volume>2</volume>
<page-range>46-55</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duckham]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kulik]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Simulation of obfuscation and negotiation for location privacy]]></article-title>
<source><![CDATA[International conference on spatial information theory COSIT'05]]></source>
<year>2005</year>
<page-range>31-48</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gruteser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoh]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the anonymity of periodic location samples]]></article-title>
<source><![CDATA[Second international conference on security in pervasive computing]]></source>
<year>2005</year>
<volume>179-192</volume>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krumm]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of computational location privacy]]></article-title>
<source><![CDATA[Personal and Ubiquitous Computing]]></source>
<year>2009</year>
<volume>13</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>391-9</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pfitzmann]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hansen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology]]></source>
<year>2005</year>
<volume>28</volume>
<page-range>1-54</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sweeney]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[k-Anonymity: A Model for Protecting Privacy]]></article-title>
<source><![CDATA[Uncertainty, Fuzziness, and Knowledge-Based Systems]]></source>
<year>2002</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>557-70</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chaum]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blind signatures for untraceable payments]]></article-title>
<source><![CDATA[Proceedings of CRYPTO '82]]></source>
<year>1982</year>
<page-range>199-203</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yuille]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shape matching and registration by data-driven EM]]></article-title>
<source><![CDATA[Computer Vision and Image Understanding]]></source>
<year>2008</year>
<volume>109</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>290-304</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shuang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ha]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Dongnan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new identity based blind signature scheme and its application]]></article-title>
<source><![CDATA[IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference]]></source>
<year>2018</year>
<page-range>672-6</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Asuquo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Cruickshank]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Morley]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Anyigor-Ogah]]></surname>
<given-names><![CDATA[C.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Lei]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bao]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges, and Countermeasures]]></article-title>
<source><![CDATA[IEEE Internet of Things Journal]]></source>
<year>2018</year>
<volume>5</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>4778-802</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashouri-Talouki]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Baraani-Dastjerdi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Movahedinia]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[BlindLocation: Supporting User Location Privacy Using Blind Signature]]></article-title>
<source><![CDATA[7th International Conference on Computer and Knowledge Engineering]]></source>
<year>2017</year>
<page-range>53-9</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Geng]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Niu]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs]]></article-title>
<source><![CDATA[IEEE Symposium on Privacy-Aware Computing]]></source>
<year>2017</year>
<page-range>200-1</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vora]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Devmurari]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanwar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyagi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Obaidat]]></surname>
<given-names><![CDATA[M.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Blind Signatures Based Secured E-Healthcare System]]></article-title>
<source><![CDATA[International Conference on Computer, Information and Telecommunication Systems]]></source>
<year>2018</year>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmadi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghahfarokhi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Preserving Privacy in Location Based Mobile Coupon Systems Using Anonymous Authentication Scheme]]></article-title>
<source><![CDATA[13th International Iranian Society of Cryptology Conference on Information Security and Cryptology]]></source>
<year>2016</year>
<page-range>60-5</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Miers]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bolt: Anonymous Payment Channels for Decentralized Currencies]]></article-title>
<source><![CDATA[ACM Conference on Computer and Communications Security]]></source>
<year>2017</year>
<page-range>473-89</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Verma]]></surname>
<given-names><![CDATA[G.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[B.B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New based fair blind signatures]]></article-title>
<source><![CDATA[International Conference on Futuristic Trends in Engineering, Science, Humanities, and Technology]]></source>
<year>2016</year>
<volume>1</volume>
<page-range>26-32</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zuberi]]></surname>
<given-names><![CDATA[R.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[S.N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure Mix-Zones for Privacy Protection of Road Network Location Based Services Users]]></article-title>
<source><![CDATA[Journal of Computer Networks and Communications]]></source>
<year>2016</year>
<volume>2016</volume>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mayank]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[A.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tor Traffic Identification]]></article-title>
<source><![CDATA[IEEE 7th International Conference on Communication Systems and Network Technologies]]></source>
<year>2017</year>
<page-range>85-91</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[I2P Anonymous Traffic Detection and Identification]]></article-title>
<source><![CDATA[IEEE 5th International Conference on Advanced Computing &amp; Communication Systems]]></source>
<year>2019</year>
<page-range>157-62</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sonklin]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Jayalath]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[A New Location-Based Services Framework for Connected Vehicles Based on the Publish-Subscribe Communication Paradigm]]></source>
<year>2019</year>
<page-range>1-16</page-range><publisher-name><![CDATA[Preprints]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chanphearith]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Santoso]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Suyoto]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis and Implementation of Location-Based Augmented Reality Mobile Application for Searching Tourist Attractions and Culinary Places in Phnom Penh City, Cambodia]]></article-title>
<source><![CDATA[International Journal of Computer Science Trends and Technology]]></source>
<year>2016</year>
<volume>4</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>106-36</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jannati]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Bahrak]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy]]></article-title>
<source><![CDATA[Wireless Personal Communications]]></source>
<year>2017</year>
<volume>97</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>3113-23</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhandwalkar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhatia]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhujbal]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Shinde]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gitem]]></surname>
<given-names><![CDATA[B.B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy Preserving and Content Protecting Location Based Queries]]></article-title>
<source><![CDATA[International Journal of Advanced Research in Computer Science and Software Engineering]]></source>
<year>2016</year>
<volume>6</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>703-4</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Messages in a concealed bottle: Achieving query content privacy with accurate location-based services]]></article-title>
<source><![CDATA[IEEE Transactions on Vehicular Technology]]></source>
<year>2018</year>
<volume>67</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>7698-711</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Solanas]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Domingo-Ferrer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Ballesté]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Location Privacy in Location-Based Services: Beyond TTP-based Schemes]]></article-title>
<source><![CDATA[Proceedings of the 1st international workshop on privacy in location-based applications (PILBA)]]></source>
<year>2008</year>
<page-range>12-23</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Private Information Retrieval in Vehicular Location-Based Services]]></article-title>
<source><![CDATA[IEEE 4th World Forum on Internet of Things (WF-IoT)]]></source>
<year>2018</year>
<page-range>56-61</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fei]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dai]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dou]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ni]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A K-anonymity based schema for location privacy preservation]]></article-title>
<source><![CDATA[IEEE Transactions on Sustainable Computing]]></source>
<year>2017</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>156-67</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Elsherbini]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[User Density and Spatial Cloaking Algorithm Selection: Improving Privacy Protection of Mobile User]]></article-title>
<source><![CDATA[IEEE 37th Sarnoff Symposium]]></source>
<year>2016</year>
<page-range>1-2</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Raymond-Choo]]></surname>
<given-names><![CDATA[K.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enhancing privacy through uniform grid and caching in location-based services]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2018</year>
<volume>86</volume>
<page-range>881-92</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Alam Bhuiyan]]></surname>
<given-names><![CDATA[M.Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Dual Privacy Preserving Scheme in Continuous Location-Based Services]]></article-title>
<source><![CDATA[IEEE Internet of Things Journal]]></source>
<year>2018</year>
<volume>5</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>4191-200</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services]]></article-title>
<source><![CDATA[Tsinghua Science and Technology]]></source>
<year>2016</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>243-59</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Bai]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ann-Move]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Location Cloaking Algorithm Based on Combinatorial Optimization for Location-Based Services in 5G Networks]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2016</year>
<volume>4</volume>
<page-range>6515-27</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[R.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hsueh]]></surname>
<given-names><![CDATA[Y.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[F.H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SocialHide: A generic distributed framework for location privacy protection]]></article-title>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2016</year>
<volume>76</volume>
<page-range>87-100</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Collaborative trajectory privacy preserving scheme in location-based services]]></article-title>
<source><![CDATA[Information Sciences]]></source>
<year>2017</year>
<volume>387</volume>
<page-range>165-79</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ye]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel location privacy-preserving scheme based on l-queries for continuous LBS]]></article-title>
<source><![CDATA[Computer Communications]]></source>
<year>2017</year>
<volume>98</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services]]></article-title>
<source><![CDATA[Future Generation Computer Systems]]></source>
<year>2019</year>
<volume>94</volume>
<page-range>40-50</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdo]]></surname>
<given-names><![CDATA[J.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Bourgeau]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Demerjian]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaouchi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing]]></article-title>
<source><![CDATA[Mobile Information Systems]]></source>
<year>2016</year>
<volume>2016</volume>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Novel Dummy-Based KNN Query Anonymization Method in Mobile Services]]></article-title>
<source><![CDATA[International Journal of Smart Home]]></source>
<year>2016</year>
<volume>10</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>137-54</page-range></nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yi]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Wan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy-area Aware All-dummy-based Location Privacy Algorithms for Location-based Services]]></article-title>
<source><![CDATA[Joint International Conference on Artificial Intelligence and Computer Engineering (AICE'16) and International Conference on Network and Communication Security NCS'16)]]></source>
<year>2016</year>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Niu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Geng]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services]]></article-title>
<source><![CDATA[IEEE Global Communications Conference GLOBECOM]]></source>
<year>2018</year>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghaffari]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghadiri]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Manshaei]]></surname>
<given-names><![CDATA[M.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lahijani]]></surname>
<given-names><![CDATA[M.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[P4QS: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications]]></article-title>
<source><![CDATA[IEEE Transactions on Vehicular Technology]]></source>
<year>2017</year>
<volume>66</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>9458-69</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>45</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brambilla]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Amoretti]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zanichelli]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Using Block Chain for Peer-to-Peer Proof-of-Location]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B46">
<label>46</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hankerson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Vanstone]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Menezes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A. Guide to elliptic curve cryptography]]></source>
<year>2004</year>
<page-range>75-142</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B47">
<label>47</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kalnis]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghinita]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Mouratidis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Papadias]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Preventing location-based identity inference in anony- mous spatial queries]]></article-title>
<source><![CDATA[IEEE Transactions on Knowledge and Data Engineering]]></source>
<year>2007</year>
<volume>19</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1719-33</page-range></nlm-citation>
</ref>
<ref id="B48">
<label>48</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chow]]></surname>
<given-names><![CDATA[C.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Mokbel]]></surname>
<given-names><![CDATA[M.F.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatial cloaking for anonymous location based services in mobile peer-to-peer environments]]></article-title>
<source><![CDATA[Geoinformática]]></source>
<year>2011</year>
<volume>15</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>351-230</page-range></nlm-citation>
</ref>
<ref id="B49">
<label>49</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin, C.]]></surname>
<given-names><![CDATA[Chi]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Deng]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Location Anonymity Based on Fake Queries in Continuous Location-Based Services]]></article-title>
<source><![CDATA[7th International Conference on Availability, Reliability and Security]]></source>
<year>2012</year>
<page-range>375-82</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>50</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Niu]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[MobiCache: When k-anonymity meets cache]]></article-title>
<source><![CDATA[IEEE Global Communications Conference]]></source>
<year>2013</year>
<page-range>820-5</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
