{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:02:02Z","timestamp":1725559322464},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540266563"},{"type":"electronic","value":"9783540316800"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11507840_3","type":"book-chapter","created":{"date-parts":[[2010,7,15]],"date-time":"2010-07-15T08:35:59Z","timestamp":1279182959000},"page":"31-43","source":"Crossref","is-referenced-by-count":10,"title":["Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling"],"prefix":"10.1007","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[]},{"given":"S.","family":"Stubblebine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"CNN. com, Anti-identity theft freeze gaining momentum; Credit companies resist measure (August 3, 2004), http:\/\/www.cnn.com\/2004\/TECH\/biztech\/08\/03\/security.freeze.ap"},{"key":"3_CR2","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C.: Client-side defense against web-based identity-theft. In: Proc. of Network and Distributed System Security Symposium (NDSS 2004), San Diego (February 2004)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Corner, M.D., Noble, B.D.: Zero-Interaction Authentication. In: Proc. of MOBICOM 2002, Atlanta, September 23\u201328 (2002)","DOI":"10.1145\/570645.570647"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. of the ACM, 84\u201388 (1981)","DOI":"10.1145\/358549.358563"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: 2003 IEEE Symp. Security and Privacy, pp. 2\u201315 (2003)","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Denning, D.E., MacDoran, P.F.: Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud and Security (February 1996)","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Federrath, H., Pfitzmann, A., Jerichow, A.: MIXes in Mobile Communication Systems: Location Management with Privacy. In: Workshop on Information Hiding, Cambridge, U.K (1996)","DOI":"10.1007\/3-540-61996-8_36"},{"key":"3_CR8","unstructured":"Fox, A., Brewer, E.: Harvest, Yield and Scalable Tolerant Systems. In: Proc. of HotOS-VII (1999)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Gabber, E., Wool, A.: On Location-Restricted Services. IEEE Network (November\/December 1999)","DOI":"10.1109\/65.806988"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Lynch, N.: Brewer\u2019s conjecture and the feasability of consistent, available, partition-tolerant web services. Sigact News\u00a033(2) (June 2002)","DOI":"10.1145\/564585.564601"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Golle, P., Juels, A.: Parallel Mixing. In: 2004 ACM Conf. Computer and Comm. Security, pp. 220\u2013226 (2004)","DOI":"10.1145\/1030083.1030113"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Gunter, C.A., May, M.J., Stubblebine, S.G.: A formal privacy system and its application to location based services. In: Workshop on Privacy Enhancing Technologies (2004)","DOI":"10.1007\/11423409_17"},{"key":"3_CR13","unstructured":"Henton, D.: Identity-theft case costs taxpayers in Alberta $540,400, The Globe and Mail, Toronto (April 12, 2004)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing, IEEE Computer (August 2001)","DOI":"10.1109\/2.940014"},{"key":"3_CR15","unstructured":"Wireless Privacy Protection Act of 2003, 108th Cong, H.R. 71 (United States)"},{"key":"3_CR16","unstructured":"Hume, M.: Security breach lets criminals view Canadians\u2019 credit reports. The Globe and Mail, Toronto, pp. A1\/A7 (March 16, 2004)"},{"key":"3_CR17","unstructured":"Hume, M.: Identity theft cited as threat after Equifax security breach. The Globe and Mail, Toronto, p. A7 (March 17, 2004)"},{"key":"3_CR18","unstructured":"Just, M., van Oorschot, P.C.: Addressing the problem of undetected signature key compromise. In: Proc. of Network and Distributed System Security Symp (NDSS 1999), San Diego (February 1999)"},{"key":"3_CR19","unstructured":"Keizer, G.: Internet Scams Cost Consumers $2.4 Billion., TechWeb News, InternetWeek (June 16, 2004)"},{"volume-title":"IDs \u2013 Not That Easy: Questions About Nationwide Identity Systems","year":"2002","key":"3_CR20","unstructured":"Kent, S.T., Millette, L. (eds.): IDs \u2013 Not That Easy: Questions About Nationwide Identity Systems. National Academies Press, U.S (2002)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Yung, M.: The Vector-Ballot e-Voting Approach. Financial Cryptography 2004, pp.72\u201389 (2004)","DOI":"10.1007\/978-3-540-27809-2_9"},{"key":"3_CR22","unstructured":"Lemos, R.: Pop-up program reads keystrokes, steals passwords. CNET News.com (June 29, 2004), http:\/\/news.com.com\/2100-7349-5251981.html"},{"key":"3_CR23","unstructured":"Lincoln, P., Porras, P., Shmatikov, V.: Privacy-Preserving Sharing and Correlation of Security Alerts. In: Proc. of 13th USENIX Security Symposium, San Diego (August 2004)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Lu, K., Ali, A.: Prevent Online Identity Theft \u2013 Using Network Smart Cards for Secure Online Transactions. In: 2004 Information Security Conference (ISC 2004), Palo Alto (September 2004)","DOI":"10.1007\/978-3-540-30144-8_29"},{"key":"3_CR25","unstructured":"Malpani, A., Housely, R., Freeman, T.: Simple Certificate Validation Protocol (SCVP), Internet Draft (work in progress) (July 2004) draft-ietf-pkix-scvp-15.txt"},{"key":"3_CR26","unstructured":"McCullagh, D.: Season over for \u2018phishing\u2019? CNET News.com (July 15, 2004), http:\/\/news.com.com\/2100-1028-5270077.html"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X 509 Internet Public Key Infrastructure: Online Certificate Status Protocol \u2013 OCSP, Internet Request for Comments 2560 (June 1999)","DOI":"10.17487\/rfc2560"},{"key":"3_CR28","unstructured":"Panda Software, Bankhook.A (Virus Encyclopedia entry), http:\/\/www.pandasoftware.com"},{"key":"3_CR29","unstructured":"Public Law No. 108-275, Identity Theft Penalty Enhancement Act, United States (July 2004)"},{"key":"3_CR30","unstructured":"Salant, J.D.: Call centers lag in cell-phone tracking upgrade, group says. The San Diego Union Tribune, A8 (February 6, 2004)"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Security verification of location claims. In: 2003 ACM Workshop on Wireless Security (WiSe 2003)","DOI":"10.1145\/941311.941313"},{"key":"3_CR32","unstructured":"Sherwood, J.: So you want to be a cybercrook. CNET News.com (ZDNET UK) (August 29, 2004), http:\/\/zdnet.com.com\/2100-1105-5317087.html"},{"key":"3_CR33","unstructured":"Volpe, J.A.: National Transportation Systems Centre, Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, Final Report (August 29, 2001)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11507840_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:54:14Z","timestamp":1559256854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11507840_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540266563","9783540316800"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11507840_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}