iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/CLOUDCOM.2014.114
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:00:44Z","timestamp":1729677644633,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cloudcom.2014.114","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T19:52:01Z","timestamp":1424202721000},"page":"731-734","source":"Crossref","is-referenced-by-count":3,"title":["CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud"],"prefix":"10.1109","author":[{"given":"Anirban","family":"Basu","sequence":"first","affiliation":[]},{"given":"Juan Camilo","family":"Corena","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Monreale","sequence":"additional","affiliation":[]},{"given":"Dino","family":"Pedreschi","sequence":"additional","affiliation":[]},{"given":"Fosca","family":"Giannotti","sequence":"additional","affiliation":[]},{"given":"Shinsaku","family":"Kiyomoto","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Yutaka","family":"Miyake","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505656"},{"journal-title":"Usability Engineering","year":"1994","author":"nielsen","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1186\/2192-113X-1-8","article-title":"Pri-vacy preserving collaborative filtering for SaaS enabling PaaS clouds","volume":"1","author":"basu","year":"2012","journal-title":"Journal of Cloud Computing Advances Systems and Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.43"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221854"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557091"},{"key":"ref9","first-page":"223","article-title":"Public-key cryptosystems based on composite degree resid-uosity classes","author":"paillier","year":"1999","journal-title":"Advances in Cryptology (EUROCRYPT)"},{"journal-title":"IEEE 24th International Conference on Data Engineering (ICDE)","first-page":"70","year":"2008","author":"jeung","key":"ref1"}],"event":{"name":"2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom)","start":{"date-parts":[[2014,12,15]]},"location":"Singapore, Singapore","end":{"date-parts":[[2014,12,18]]}},"container-title":["2014 IEEE 6th International Conference on Cloud Computing Technology and Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7031670\/7036227\/07037750.pdf?arnumber=7037750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:43:58Z","timestamp":1498196638000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7037750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/cloudcom.2014.114","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}