{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:GGNJKO2YPFFJSSA7KQKQQV2WIL","short_pith_number":"pith:GGNJKO2Y","canonical_record":{"source":{"id":"1804.01636","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-05T00:42:13Z","cross_cats_sorted":[],"title_canon_sha256":"da14268791ce3cce88b92a77952383a2c5d10bfd980c0439ed5131977ed6fbdc","abstract_canon_sha256":"4ffcc3891050fb1527c5b7259e40e497dd0540cb9a7f47630a73ee0cae4f6c99"},"schema_version":"1.0"},"canonical_sha256":"319a953b58794a99481f541508575642f3b3279b51698977e7f059e8e296ed70","source":{"kind":"arxiv","id":"1804.01636","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1804.01636","created_at":"2026-05-18T00:19:10Z"},{"alias_kind":"arxiv_version","alias_value":"1804.01636v1","created_at":"2026-05-18T00:19:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1804.01636","created_at":"2026-05-18T00:19:10Z"},{"alias_kind":"pith_short_12","alias_value":"GGNJKO2YPFFJ","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GGNJKO2YPFFJSSA7","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GGNJKO2Y","created_at":"2026-05-18T12:32:25Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:GGNJKO2YPFFJSSA7KQKQQV2WIL","target":"record","payload":{"canonical_record":{"source":{"id":"1804.01636","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-05T00:42:13Z","cross_cats_sorted":[],"title_canon_sha256":"da14268791ce3cce88b92a77952383a2c5d10bfd980c0439ed5131977ed6fbdc","abstract_canon_sha256":"4ffcc3891050fb1527c5b7259e40e497dd0540cb9a7f47630a73ee0cae4f6c99"},"schema_version":"1.0"},"canonical_sha256":"319a953b58794a99481f541508575642f3b3279b51698977e7f059e8e296ed70","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:19:10.607717Z","signature_b64":"uouNqQwB6cQc/l/r5nrdv3kpFJ3UlmK38KEnopvKGk+CPmQoj50Fdc7d2499lsXzwaIb+bFUWjeIuWJdyckGDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"319a953b58794a99481f541508575642f3b3279b51698977e7f059e8e296ed70","last_reissued_at":"2026-05-18T00:19:10.607173Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:19:10.607173Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1804.01636","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:19:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"f6w+jRfaTyPQN3S2dLJO+b2mp5op5amuqO2eSZjAlDHZMV5MGpedMirTQtz0GFemi/B860TakJmNOtO3Gg0GBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T11:58:29.605180Z"},"content_sha256":"e416e9e215437129f6e5700f5308ec0b0f4e3ae1ef807b6021f0448b483915f4","schema_version":"1.0","event_id":"sha256:e416e9e215437129f6e5700f5308ec0b0f4e3ae1ef807b6021f0448b483915f4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:GGNJKO2YPFFJSSA7KQKQQV2WIL","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Preserving Location Privacy in Mobile Edge Computing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Hongli Zhang, Mohsen Guizani, Xiaojiang Du, Yuhang Wang","submitted_at":"2018-04-05T00:42:13Z","abstract_excerpt":"The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the fingerprint localization, and the previous studies on location privacy are ineffective because of the different threat model and information semantic. To address the location privacy in MEC environment,"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1804.01636","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:19:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QrQqmQDERVbr4oO9xNOlN9xxGmLlMPhg1vic1dQ/Lrsbm4p2e6jj7LMchP07stVmnY0H80O3tBJu/miOb/rECg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T11:58:29.605926Z"},"content_sha256":"90eadfc4cc7366143384b65b637498ca55c27ab3b488997d2aa2e01cb555d82f","schema_version":"1.0","event_id":"sha256:90eadfc4cc7366143384b65b637498ca55c27ab3b488997d2aa2e01cb555d82f"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/GGNJKO2YPFFJSSA7KQKQQV2WIL/bundle.json","state_url":"https://pith.science/pith/GGNJKO2YPFFJSSA7KQKQQV2WIL/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/GGNJKO2YPFFJSSA7KQKQQV2WIL/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T11:58:29Z","links":{"resolver":"https://pith.science/pith/GGNJKO2YPFFJSSA7KQKQQV2WIL","bundle":"https://pith.science/pith/GGNJKO2YPFFJSSA7KQKQQV2WIL/bundle.json","state":"https://pith.science/pith/GGNJKO2YPFFJSSA7KQKQQV2WIL/state.json","well_known_bundle":"https://pith.science/.well-known/pith/GGNJKO2YPFFJSSA7KQKQQV2WIL/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:GGNJKO2YPFFJSSA7KQKQQV2WIL","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"4ffcc3891050fb1527c5b7259e40e497dd0540cb9a7f47630a73ee0cae4f6c99","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-05T00:42:13Z","title_canon_sha256":"da14268791ce3cce88b92a77952383a2c5d10bfd980c0439ed5131977ed6fbdc"},"schema_version":"1.0","source":{"id":"1804.01636","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1804.01636","created_at":"2026-05-18T00:19:10Z"},{"alias_kind":"arxiv_version","alias_value":"1804.01636v1","created_at":"2026-05-18T00:19:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1804.01636","created_at":"2026-05-18T00:19:10Z"},{"alias_kind":"pith_short_12","alias_value":"GGNJKO2YPFFJ","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_16","alias_value":"GGNJKO2YPFFJSSA7","created_at":"2026-05-18T12:32:25Z"},{"alias_kind":"pith_short_8","alias_value":"GGNJKO2Y","created_at":"2026-05-18T12:32:25Z"}],"graph_snapshots":[{"event_id":"sha256:90eadfc4cc7366143384b65b637498ca55c27ab3b488997d2aa2e01cb555d82f","target":"graph","created_at":"2026-05-18T00:19:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the fingerprint localization, and the previous studies on location privacy are ineffective because of the different threat model and information semantic. To address the location privacy in MEC environment,","authors_text":"Hongli Zhang, Mohsen Guizani, Xiaojiang Du, Yuhang Wang","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-05T00:42:13Z","title":"Preserving Location Privacy in Mobile Edge Computing"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1804.01636","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:e416e9e215437129f6e5700f5308ec0b0f4e3ae1ef807b6021f0448b483915f4","target":"record","created_at":"2026-05-18T00:19:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"4ffcc3891050fb1527c5b7259e40e497dd0540cb9a7f47630a73ee0cae4f6c99","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-05T00:42:13Z","title_canon_sha256":"da14268791ce3cce88b92a77952383a2c5d10bfd980c0439ed5131977ed6fbdc"},"schema_version":"1.0","source":{"id":"1804.01636","kind":"arxiv","version":1}},"canonical_sha256":"319a953b58794a99481f541508575642f3b3279b51698977e7f059e8e296ed70","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"319a953b58794a99481f541508575642f3b3279b51698977e7f059e8e296ed70","first_computed_at":"2026-05-18T00:19:10.607173Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:19:10.607173Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"uouNqQwB6cQc/l/r5nrdv3kpFJ3UlmK38KEnopvKGk+CPmQoj50Fdc7d2499lsXzwaIb+bFUWjeIuWJdyckGDg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:19:10.607717Z","signed_message":"canonical_sha256_bytes"},"source_id":"1804.01636","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:e416e9e215437129f6e5700f5308ec0b0f4e3ae1ef807b6021f0448b483915f4","sha256:90eadfc4cc7366143384b65b637498ca55c27ab3b488997d2aa2e01cb555d82f"],"state_sha256":"e01258901e48f4fb43e50122457832e129c189198aaccd868e8b148c69154139"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ivHLsGNN9C7rPu9U18oEfccvDj4g6ZQjdlp0PQ8QFvRDmtUb5z7VJxQfaTAAjKYVWb737EyYRnsDx1948kaVBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T11:58:29.609979Z","bundle_sha256":"d80b5a9454de7b92cf5ffdf0832e100591c65aa61b81447ef43f8fcd5d82dd55"}}