{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:14Z","timestamp":1725560174344},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282242"},{"type":"electronic","value":"9783540317968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11537878_11","type":"book-chapter","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T14:07:07Z","timestamp":1279548427000},"page":"100-109","source":"Crossref","is-referenced-by-count":4,"title":["A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms"],"prefix":"10.1007","author":[{"given":"Oliver","family":"Jorns","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Julia","family":"Gross","sequence":"additional","affiliation":[]},{"given":"Sandford","family":"Bessler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Parlay: Parlay x, http:\/\/www.parlay.org\/ (accessed May 03, 2005)"},{"key":"11_CR2","unstructured":"W3C (Soap (simple object access protocol) version 1.2), http:\/\/www.w3.org\/TR\/soap (accessed May 03)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-36467-6_8","volume-title":"Privacy Enhancing Technologies","author":"T. Alam\u00e4ki","year":"2003","unstructured":"Alam\u00e4ki, T., Bj\u00f6rksten, M., Dornbach, P., Gripenberg, C., Gyorb\u00edr\u00f3, N., M\u00e1rton, G., N\u00e9meth, Z., Skytt\u00e4, T., Tarkiainen, M.: Privacy enhancing service architectures. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 99\u2013109. Springer, Heidelberg (2003)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"11_CR5","unstructured":"ISO\/IEC 9797-2: Information Technology \u2014 Security Techniques \u2014 Message Authentication Codes (MACs) - Part 2: Mechanisms Using a Dedicated Hash-Function. International Organization for Standardization, Geneva, Switzerland (2002)"},{"key":"11_CR6","unstructured":"Menezes, A.J.A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA (1997)"},{"key":"11_CR7","unstructured":"National Institute of Standards and Technology: Secure hash standard (SHS). Federal Information Processing Standards Publication 180-2 (2002)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Rivest, R.: RFC 1321: The MD5 message-digest algorithm, Status: INFORMATIONAL (1992)","DOI":"10.17487\/rfc1321"},{"key":"11_CR9","unstructured":"Wang, X., Lai, X., Daum, M.: Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD (2004), http:\/\/eprint.iacr.org\/2004\/199.pdf"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Collision search attacks on SHA1, http:\/\/www.infosec.sdu.edu.cn\/paper\/sha-attack-note.pdf (2005)","DOI":"10.1007\/11535218_1"},{"key":"11_CR11","unstructured":"ECRYPT Network of Excellence: Recent collision attacks on hash functions: ECRYPT position paper, http:\/\/www.ecrypt.eu.org\/documents\/ECRYPT-hash-statement.pdf (accessed May 03, 2004)"},{"key":"11_CR12","unstructured":"Andersson, C., Lundin, R., Fischer-Huebner, S.: Enabling anonymity for the mobile internet using the mcrowds system. In: FIP WG 9.2, 9.6\/11.7 Summer School on Risks and Challenges of the Network Society, Karlstad University Studies (2004)"},{"key":"11_CR13","unstructured":"Jorns, O., Bessler, S., Pailer, R.: An Efficient Mechanism to ensure Location Privacy in Telecommunication Service Applications. In: Proc. International Conference on Network Control and Engineering, Palma de Mallorca, Spain (2004)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11537878_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:12:39Z","timestamp":1605625959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11537878_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282242","9783540317968"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11537878_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}