{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:56:49Z","timestamp":1742965009393,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_57","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:47Z","timestamp":1319723447000},"page":"732-734","source":"Crossref","is-referenced-by-count":0,"title":["Location Privacy in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Marco","family":"Gruteser","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1_57","volume-title":"Privacy and freedom","author":"A Westin","year":"1967","unstructured":"Westin A (1967) Privacy and freedom. Atheneum, New\u00a0York"},{"key":"57_CR2_57","volume-title":"On locational privacy, and how to avoid losing it forever, Electronic Frontier Foundation Whitepaper","author":"A Blumberg","year":"2009","unstructured":"Blumberg A, Eckersley P (2009) On locational privacy, and how to avoid losing it forever, Electronic Frontier Foundation Whitepaper, August\u00a02009"},{"key":"57_CR3_57","unstructured":"S1164, Location Privacy Protection Act of 2001. United States congressional\u00a0record"},{"issue":"6","key":"57_CR4_57","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"Krumm J (2009) A survey of computational location privacy. Pers Ubiquit Comput 13(6):391\u2013399","journal-title":"Pers Ubiquit Comput"},{"key":"57_CR5_57","volume-title":"Preserving privacy in GPS traces via density-aware path cloaking","author":"B Hoh","year":"2007","unstructured":"Hoh B, Gruteser M, Xiong H, Alrabady A (2007) Preserving privacy in GPS traces via density-aware path cloaking. In: Proceedings of the 14th ACM conference on Computer and communications security (CCS), Alexandria,\u00a02007"},{"issue":"1","key":"57_CR6_57","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46\u201355","journal-title":"IEEE Pervasive Comput"},{"key":"57_CR7_57","volume-title":"Anonymous usage of location-based services through spatial and temporal cloaking","author":"M Gruteser","year":"2003","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of First ACM\/USENIX international conference on mobile systems, applications, and services (MobiSys), San Francisco, CA, May\u00a02003"},{"key":"57_CR8_57","volume-title":"Improving wireless privacy with an identifier-free link layer protocol","author":"B Greenstein","year":"2008","unstructured":"Greenstein B, McCoy D, Pang J, Kohno T, Seshan S, Wetherall D (2008) Improving wireless privacy with an identifier-free link layer protocol. In: Proceeding of the 6th international conference on mobile systems, applications, and services, Breckenridge, CO, 17\u201320 June\u00a02008"},{"key":"57_CR9_57","volume-title":"Enhancing source-location privacy in sensor network routing","author":"P Kamat","year":"2005","unstructured":"Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source-location privacy in sensor network routing. In: ICDCS 2005 Proceedings of 25th IEEE international conference, Columbus"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T23:57:49Z","timestamp":1591055869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_57","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}