{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:08:54Z","timestamp":1761620934165},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540347453"},{"type":"electronic","value":"9783540347460"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767831_5","type":"book-chapter","created":{"date-parts":[[2006,6,21]],"date-time":"2006-06-21T08:03:07Z","timestamp":1150876987000},"page":"59-77","source":"Crossref","is-referenced-by-count":27,"title":["Towards Modeling Wireless Location Privacy"],"prefix":"10.1007","author":[{"given":"Leping","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Yamane","sequence":"additional","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Sezaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Bandara, U., Hasegawa, M., Inoue, M., Morikawa, H., Aoyama, T.: Design and implementation of a bluetooth signal strength based location sensing system. In: Proc. of IEEE Radio and Wireless Conference (RAWCON 2004), Atlanta, U.S.A. (2004)","DOI":"10.1109\/RAWCON.2004.1389140"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.: Radar: an in-building rf-based user location and tracking system. In: Proc. of IEEE INFOCOM 2000, Tel-Aviv, Israel, vol.\u00a02, pp. 775\u2013784 (2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02, 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bluetooth SIG: Bluetooth 1.2 draft 4 (2003)","DOI":"10.1016\/S1353-4858(03)00507-5"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: Proc. of IEEE Wireless Communications and Networking Conference (WCNC 2005), NL, U.S. (2005)","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"5_CR6","unstructured":"Guvenc, I., Abdallah, C., Jordan, R., Dedeoglu, O.: Enhancements to RSS based indoor tracking systems using kalman filter. In: Proc. of Intl. Signal Processing Conf. (ISPC), Dallas, TX, U.S. (2003)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/35.983917","volume":"40","author":"K. Pahlavan","year":"2002","unstructured":"Pahlavan, K., Li, X., Makela, J.: Indoor geolocation science and technology. IEEE Communications Magazine\u00a040, 112\u2013118 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In: Proc. of first ACM international workshop on Wireless mobile applications and services on WLAN hotspots (WMASH 2003), San Diego, CA, USA (2003)","DOI":"10.1145\/941326.941334"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-540-39881-3_5","volume-title":"Security in Pervasive Computing","author":"M. Gruteser","year":"2004","unstructured":"Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 10\u201324. Springer, Heidelberg (2004)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys 2003, San Francisco, CA, USA, USENIX, pp. 31\u201342 (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024, 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-40956-4_2","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Serjantov, A.: Generalising mixes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 18\u201331. Springer, Heidelberg (2003)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-30108-0_7","volume-title":"Computer Security \u2013 ESORICS 2004","author":"S. Mauw","year":"2004","unstructured":"Mauw, S., Verschuren, J.H.S., de Vink, E.P.: A formalization of anonymity and onion routing. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 109\u2013124. Springer, Heidelberg (2004)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/3-540-44702-4_6","volume-title":"Designing Privacy Enhancing Technologies","author":"P.F. Syverson","year":"2001","unstructured":"Syverson, P.F., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 96. Springer, Heidelberg (2001)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-40956-4_3","volume-title":"Privacy Enhancing Technologies","author":"S. Steinbrecher","year":"2003","unstructured":"Steinbrecher, S., K\u00f6psell, S.: Modelling unlinkability. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 32\u201347. Springer, Heidelberg (2003)"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3233\/JCS-2004-12102","volume":"12","author":"D. Hughes","year":"2004","unstructured":"Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security\u00a012, 3\u201336 (2004)","journal-title":"Journal of Computer Security"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Yamazaki, K., Sezaki, K.: Spatio-temporal addressing scheme for mobile ad hoc networks. In: Proc. of IEEE TENCON 2004, Chiang Mai, Thailand (2004)","DOI":"10.1109\/TENCON.2004.1414572"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology\u00a01, 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. Reiter","year":"1998","unstructured":"Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security\u00a01, 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"355","DOI":"10.3233\/JCS-2004-123-403","volume":"12","author":"V. Shmatikov","year":"2004","unstructured":"Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security\u00a012, 355\u2013377 (2004)","journal-title":"Journal of Computer Security"},{"key":"5_CR24","unstructured":"Toilers Group, (Online): http:\/\/toilers.mines.edu\/"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767831_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T09:30:23Z","timestamp":1555666223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767831_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540347453","9783540347460"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11767831_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}