{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:09:29Z","timestamp":1760044169431},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308034"},{"type":"electronic","value":"9783540322962"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596042_103","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T15:14:40Z","timestamp":1132845280000},"page":"1006-1015","source":"Crossref","is-referenced-by-count":5,"title":["An Effective Method for Location Privacy in Ubiquitous Computing"],"prefix":"10.1007","author":[{"given":"Gunhee","family":"Lee","sequence":"first","affiliation":[]},{"given":"Wonil","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dong-kyoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Garlan, D., Siewiorek, D.P.: Project Aura: Toward Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 22\u201331 (2002)","key":"103_CR1","DOI":"10.1109\/MPRV.2002.1012334"},{"unstructured":"Rodden, T., Friday, A., Muller, H., Dix, A.: A Lightweight Approach to Managing Privacy in Location-Based Services. In: Proceedings of Equator Annual Conference (2002)","key":"103_CR2"},{"doi-asserted-by":"crossref","unstructured":"Duri, S., Gruteser, M., et al.: Framework for Security and Privacy in Automotive Telematics. In: WMC 2002, Atlanta, Georgia USA, pp. 25\u201332 (2002)","key":"103_CR3","DOI":"10.1145\/570705.570711"},{"doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In: WMASH 2003, San Diego, California USA, pp. 46\u201355 (2003)","key":"103_CR4","DOI":"10.1145\/941326.941334"},{"doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: MobiSys, USENIX, pp. 31\u201342 (2003)","key":"103_CR5","DOI":"10.1145\/1066116.1189037"},{"key":"103_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Snekkenes, E.: Concepts for Personal Location Privacy Policies. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, pp. 48\u201357 (2001)","key":"103_CR7","DOI":"10.1145\/501158.501164"},{"doi-asserted-by":"crossref","unstructured":"Hengartner, U., Steenkiste, P.: Implementing Access Control to People Location Information. In: SACMAT 2004, NewYork, USA, pp. 11\u201320 (2004)","key":"103_CR8","DOI":"10.1145\/990036.990039"},{"unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification (2004), http:\/\/www.w3.org\/TR\/P3P\/","key":"103_CR9"},{"unstructured":"Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy, CERCS Technical Reports, GIT-CERCS-04-15 (2004)","key":"103_CR10"},{"doi-asserted-by":"crossref","unstructured":"Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. In: PERVASIVE computing, IEEE CS and IEEE Communications Society, pp. 46\u201355 (2003)","key":"103_CR11","DOI":"10.1109\/MPRV.2003.1186725"},{"unstructured":"Beresford, A., Stajano, F.: Mix Zones: User privacy in location-aware services. In: Proceedings of First IEEE International Workshop on Pervasive Computing and Communication Security, A Workshop in PerCom 2004 (2004)","key":"103_CR12"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596042_103.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:53:18Z","timestamp":1619506398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596042_103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308034","9783540322962"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11596042_103","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}