{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:26:11Z","timestamp":1742390771455},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_28","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"325-336","source":"Crossref","is-referenced-by-count":3,"title":["Enabling Privacy of Real-Life LBS"],"prefix":"10.1007","author":[{"given":"Jan","family":"Zibuschka","sequence":"first","affiliation":[]},{"given":"Lothar","family":"Fritsch","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Radmacher","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Scherner","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Bundesnetzagentur: Jahresbericht. 2005."},{"key":"28_CR2","first-page":"113","volume-title":"Security and Control of Information Technology in Society \u2014 Proceedings of the IFIP TC9\/WG 9.6 Working Conference August 12-17","author":"K. Rannenberg","year":"1994","unstructured":"K. Rannenberg, \u201cRecent Development in Information Technology Security Evaluation \u2014 The Need for Evaluation Criteria for multilateral Security\u201d, in Richard Sizer et al.: Security and Control of Information Technology in Society \u2014 Proceedings of the IFIP TC9\/WG 9.6 Working Conference August 12-17, St. Petersburg, Russia, North-Holland, Amsterdam, pp. 113\u2013128, 1994."},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/366173.366208","volume-title":"Proceedings of the 9th ACM New Security Paradigms Workshop","author":"K. Rannenberg","year":"2000","unstructured":"K. Rannenberg, \u201cMultilateral Security \u2014 A concept and examples for balanced security\u201d, in Proceedings of the 9th ACM New Security Paradigms Workshop, Cork, Ireland: ACM Press, 2000, pp. 151\u2013162."},{"key":"28_CR4","series-title":"Lecture Notes on Computer Science (LNCS","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-540-32004-3_18","volume-title":"Proceedings of the 2nd Intl. Conference on Security in Pervasive Computing","author":"T. Koelsch","year":"2005","unstructured":"T. Koelsch, L. Fritsch, M. Kohlweiss, D. Kesdogan, \u201cPrivacy for Profitable Location Based Services\u201d, Proceedings of the 2nd Intl. Conference on Security in Pervasive Computing, Lecture Notes on Computer Science (LNCS 3450, pp. 164\u2013179), Springer; Boppard, Germany, 2005."},{"key":"28_CR5","unstructured":"M. Kohlweiss, B. Gedrojc, \u201cFlexible Location Based Service Protocols Using Efficient Oblivious Transfer\u201d, Kryptowochenende, 2006."},{"key":"28_CR6","unstructured":"G.W. Blarkom; J. Borking; J.G. Olk: Handbook of Privacy and Privacy-Enhancing Technologies. College bescherming persoonsgegevens, The Hague. 2003."},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"K. Synnes; J. North; P. Parnes; Location Privacy in the Alipes Platform; Institutionen f\u00f6r Systemteknik; Lulea University of Technology; 2002.","DOI":"10.1109\/HICSS.2003.1174843"},{"key":"28_CR8","unstructured":"R. Cheng; S. Prabhakar: Using Uncertainty to Provide-Preserving and High-Quality Location-Based Services, in: Workshop on Location Systems, Privacy and Control, 2004."},{"key":"28_CR9","unstructured":"Jorns, O,-Bessler, S.: PRIVES: A privacy enhanced location based scheme, in: Workshop on Location Systems, Privacy and Control, 2004."},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"A. Albers, S. Figge, M. Radmacher, \u201cLOC3 \u2014 Architecture Proposal for Efficient Subscriber Localisation in Mobile Commerce Infrastructures\u201d, in Proceedings of 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS\u201905); M\u00fcnchen, 2005.","DOI":"10.1109\/WMCS.2005.12"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"T. Lindner, L. Fritsch, K. Plank, K. Rannenberg, \u201cExploitation of Public and Private WiFi Coverage for New Business Models\u201d, Proceedings of the 4th IFIP Conference on E-Commerce, E-Business, and E-Government (BE), 2004.","DOI":"10.1007\/1-4020-8155-3_8"},{"key":"28_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-99805-8","volume-title":"The economics, concept and design of information intermediaries","author":"F. Rose","year":"1999","unstructured":"F. Rose, The economics, concept and design of information intermediaries. Heidelberg, Physica-Verlag, 1999."}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T08:58:33Z","timestamp":1556960313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_28","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}