{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:26:06Z","timestamp":1743053166658,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540273240"},{"type":"electronic","value":"9783540315841"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11516798_27","type":"book-chapter","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T04:29:05Z","timestamp":1279081745000},"page":"369-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure Location Verification Using Radio Broadcast"],"prefix":"10.1007","author":[{"given":"Adnan","family":"Vora","sequence":"first","affiliation":[]},{"given":"Mikhail","family":"Nesterenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,8,23]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the ACM workshop on Wireless security, San Diego, CA, pp. 1\u201310 (2003)","DOI":"10.1145\/941311.941313"},{"key":"27_CR2","unstructured":"Naik, V., Arora, A., Bapat, S., Gouda, M.: Dependable systems: Whisper: Local secret maintenance in sensor networks. IEEE Distributed Systems Online\u00a04 (2003)"},{"key":"27_CR3","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, CA, Internet Society (2002)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Denning, D.E., MacDoran, P.F.: Location-based authentication: Grounding cyberspace for better security. In: Denning, D.E., Denning, P.J. (eds.) Internet Besieged: Countering Cyberspace Scofflaws, pp. 167\u2013174. ACM Press \/ Addison-Wesley (1998); Reprint from Computer Fraud and Security. Elsevier Science, Ltd., Amsterdam (February 1996)","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"27_CR5","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks. In: INFOCOM 2003 (2003)"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"27_CR7","first-page":"1","volume-title":"Proceedings of the eighth Annual International Conference on Mobile Computing and Networking (MOBICOM 2002)","author":"M.D. Corner","year":"2002","unstructured":"Corner, M.D., Noble, B.D.: Zero-interaction authentication. In: Proceedings of the eighth Annual International Conference on Mobile Computing and Networking (MOBICOM 2002), pp. 1\u201311. ACM Press, New York (2002)"},{"key":"27_CR8","unstructured":"Kindberg, T., Zhang, K.: Context authentication using constrained channels. Technical Report HPL-2001-84, Hewlett Packard Laboratories (2001)"},{"key":"27_CR9","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1145\/288090.288121","volume-title":"Proceedings of the 5th ACM Conference on Computer and Communications Security","author":"E. Gabber","year":"1998","unstructured":"Gabber, E., Wool, A.: How to prove where you are: Tracking the location of customer equipment. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, California, pp. 142\u2013149. ACM Press, New York (1998)"},{"key":"27_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1098-6","volume-title":"Computational Geometry: An Introduction","author":"F.P. Preparata","year":"1985","unstructured":"Preparata, F.P., Shamos, M.I.: Computational Geometry: An Introduction. Springer, New York (1985)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication security in wireless ad-hoc sensor networks. In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139\u2013144 (2002)","DOI":"10.1109\/ENABL.2002.1030000"},{"key":"27_CR12","unstructured":"Tinysec: Link layer encryption for tiny devices, http:\/\/www.cs.berkeley.edu\/nks\/tinysec\/"},{"key":"27_CR13","unstructured":"Tinypk project, http:\/\/www.is.bbn.com\/projects\/lws-nest\/"}],"container-title":["Lecture Notes in Computer Science","Principles of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11516798_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T22:07:58Z","timestamp":1740262078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11516798_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540273240","9783540315841"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11516798_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]},"assertion":[{"value":"23 August 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}