{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:41:48Z","timestamp":1725496908836},"publisher-location":"Boston, MA","reference-count":25,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387327211"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-46276-9_13","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T12:27:34Z","timestamp":1196512054000},"page":"299-322","source":"Crossref","is-referenced-by-count":1,"title":["Location Privacy in Wireless LAN"],"prefix":"10.1007","author":[{"given":"Leping","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Yamane","sequence":"additional","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Sezaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Bandara, U., Hasegawa, M., Inoue, M., Morikawa, H., Aoyama, T.: Design and implementation of a bluetooth signal strength based location sensing system. In: Proc. of IEEE Radio and Wireless Conference (RAWCON 2004), Atlanta, U.S.A (2004)","DOI":"10.1109\/RAWCON.2004.1389140"},{"key":"13_CR2","unstructured":"Hitachi: Hitachi\u2019s air location (2004) http:\/\/www.hitachi.co.jp\/airlocation\/."},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.: Radar: an in-building rf-based user location and tracking system. In: Proc. of IEEE INFOCOM 2000, Tel-Aviv, Israel (2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A. Beresford","year":"2003","unstructured":"Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2 (2003) 46\u201355","journal-title":"IEEE Pervasive Computing"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"BluetoothSIG: Bluetooth 1.2 draft 4 (2003)","DOI":"10.1016\/S1353-4858(03)00507-5"},{"key":"13_CR6","unstructured":"IEEE: 802.11-1999(reaffr 2003) (2003)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Mauw, S., Verschuren, J., Vink, E.d.: A formalization of anonymity and onion routing. In: ESORICS 2004, Sophia Antipolis, France (2004)","DOI":"10.1007\/978-3-540-30108-0_7"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Steinbrecher, S., Kopsell, S.: Modelling unlinkability. In: Proc. of PET 2003, Elbflorenz Dresden, Germany (2003)","DOI":"10.1007\/978-3-540-40956-4_3"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Yamazaki, K., Sezaki, K.: Spatio-temporal addressing scheme for mobile ad hoc networks. In: Proc. of IEEE TENCON 2004, Chiang Mai, Thailand (2004)","DOI":"10.1109\/TENCON.2004.1414572"},{"key":"13_CR10","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Proc. of PET 2002. Volume 2482 of LNCS., Springer (2002)"},{"key":"13_CR11","volume-title":"5th International Workshop on Information Hiding(IH2002)","author":"A. Serjantov","year":"2002","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: 5th International Workshop on Information Hiding(IH2002), Noordwijkerhout, The Netherlands, spinger (2002)"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1 (1988) 65\u201375","journal-title":"Journal of Cryptology"},{"key":"13_CR13","series-title":"LNCS","volume-title":"Proc. of PET 2003","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Serjantov, A.: Generalising mixes. In: Proc. of PET 2003. LNCS 2760, Dresden, Germany, Springer-Verlag (2003)"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. Reiter","year":"1998","unstructured":"Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1 (1998) 66\u201392","journal-title":"ACM Transactions on Information and System Security"},{"key":"13_CR15","unstructured":"Guvenc, I., Abdallah, C., Jordan, R., Dedeoglu, O.: Enhancements to rss based indoor tracking systems using kalman filter. In: Proc. of Intl. Signal Processing Conf.(ISPC), Dallas, TX, U.S. (2003)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Pahlavan, K., Li, X., Makela, J.P.: Indoor geolocation science and technology. IEEE Communications Magazine (2002)","DOI":"10.1109\/35.983917"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. In: Proc. of 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots(WMASH 2003), San Diego, CA, USA (2003)","DOI":"10.1145\/941326.941334"},{"key":"13_CR18","series-title":"LNCS","volume-title":"Proc. of 1st Intl. Conf. on Security in Pervasive Computing(SPC 2003)","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Proc. of 1st Intl. Conf. on Security in Pervasive Computing(SPC 2003). Volume 2802 of LNCS., Boppard, Germany, Springer (2003)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of ACM MobiSys 2003, San Francisco, CA, USA, USENIX (2003) 31\u201342","DOI":"10.1145\/1066116.1189037"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84\u201388","journal-title":"Communications of the ACM"},{"key":"13_CR21","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference (WCNC 2005), NL, U.S. (2005)"},{"key":"13_CR22","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Proc. of PET 2002. Volume 2482 of LNCS., Springer (2002)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Proc. of Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA (2000)","DOI":"10.21236\/ADA465255"},{"key":"13_CR24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2004-12102","volume":"12","author":"D. Hughes","year":"2004","unstructured":"Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security 12 (2004) 3\u201336","journal-title":"Journal of Computer Security"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security (2004)","DOI":"10.3233\/JCS-2004-123-403"}],"container-title":["Advances in Information Security","Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-46276-9_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T02:09:16Z","timestamp":1619575756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-46276-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387327211"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-46276-9_13","relation":{},"subject":[]}}