{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:55:36Z","timestamp":1725468936289},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540368502"},{"type":"electronic","value":"9783540368519"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11807964_63","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T10:14:24Z","timestamp":1156500864000},"page":"619-628","source":"Crossref","is-referenced-by-count":1,"title":["A Privacy-Aware Service Protocol for Ubiquitous Computing Environments"],"prefix":"10.1007","author":[{"given":"Gunhee","family":"Lee","sequence":"first","affiliation":[]},{"given":"Song-hwa","family":"Chae","sequence":"additional","affiliation":[]},{"given":"Inwhan","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Manpyo","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MC.2002.1012427","volume":"35","author":"F. Stajano","year":"2002","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE Computer\u00a035, 22\u201326 (2002)","journal-title":"IEEE Computer"},{"key":"63_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-46019-5","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"L. Bussard","year":"2002","unstructured":"Bussard, L., Roudier, Y.: Authentication in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Hengartner, U., Steenkiste, P.: Implementing Access Control to People Location Information. In: Proc. of SACMAT 2004, NewYork, USA, pp. 11\u201320 (2004)","key":"63_CR3","DOI":"10.1145\/990036.990039"},{"unstructured":"Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy, CERCS Technical Reports, GIT-CERCS-04-15 (2004)","key":"63_CR4"},{"doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of International Conference on Mobile Systems, Applications, and Services, pp. 31\u201342 (2003)","key":"63_CR5","DOI":"10.1145\/1066116.1189037"},{"key":"63_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"R. Beresford","year":"2003","unstructured":"Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02, 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"doi-asserted-by":"crossref","unstructured":"Hong, J., Landay, J.: An Architecture for Privacy-Sensitive Ubiquitous Computing. In: Proc. of International Conference on Mobile Systems, Applications, and Services, pp. 177\u2013189 (2004)","key":"63_CR7","DOI":"10.1145\/990064.990087"},{"unstructured":"D\u00edaz, C., Preneel, B.: Taxonomy of Mixes and Dummy Traffic. In: Proc. of I-NetSec 2004: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, Toulouse, France (2004)","key":"63_CR8"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2) (1982)","key":"63_CR9","DOI":"10.1145\/358549.358563"},{"doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N., Hopwood, D.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Symposium on Security and Privacy, pp. 2\u201315 (2003)","key":"63_CR10","DOI":"10.1109\/SECPRI.2003.1199323"},{"issue":"1","key":"63_CR11","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. Reiter","year":"1998","unstructured":"Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proc. of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, pp. 91\u2013102 (2002)","key":"63_CR12","DOI":"10.1145\/644527.644537"},{"doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (2004)","key":"63_CR13","DOI":"10.21236\/ADA465464"},{"doi-asserted-by":"crossref","unstructured":"Garlan, D., Siewiorek, D.P.: Project Aura: Toward Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 22\u201331 (2002)","key":"63_CR14","DOI":"10.1109\/MPRV.2002.1012334"},{"unstructured":"The OpenSSL Project, \n                    \n                      http:\/\/www.openssl.org\/","key":"63_CR15"},{"doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability and pseudonymity - a proposal for terminology. In: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, pp. 1\u20139 (2001)","key":"63_CR16","DOI":"10.1007\/3-540-44702-4_1"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11807964_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:26:22Z","timestamp":1619493982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11807964_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540368502","9783540368519"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11807964_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}