{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:40Z","timestamp":1740099280619,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030059279"},{"type":"electronic","value":"9783030059286"}],"license":[{"start":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T00:00:00Z","timestamp":1546128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05928-6_4","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T18:03:11Z","timestamp":1546106591000},"page":"36-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preserving for Location-Based IoT Services"],"prefix":"10.1007","author":[{"given":"Yue","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"key":"4_CR1","unstructured":"Prigg, M.: Privacy warning over app that can track your location even if you turn GPS off on your phone. http:\/\/www.dailymail.co.uk\/sciencetech\/article-5134219\/App-track-location-turn-GPSoff.html . Accessed 10 Dec 2017"},{"key":"4_CR2","unstructured":"Chong, Z.: Obike becomes latest victim of global data breach. https:\/\/www.cnet.com\/news\/yellow-bike-sharing-firm-is-new-victim-of-global-data-breach\/ . Accessed 12 Dec 2017"},{"key":"4_CR3","unstructured":"Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of NDSS 2011 (2011)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Saldamli, G., Chow, R., Jin, H., Knijnenburg, B.P.: Private proximity testing with an untrusted server. In: Proceedings of 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013, WISEC 2013, pp. 113\u2013118. ACM (2013)","DOI":"10.1145\/2462096.2462115"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Zhuo, G., Jia, Q., Guo, L., Li, M., Fang, Y.: Privacy-preserving verifiable proximity test for location-based services. In: Proceedings of IEEE Global Communications Conference 2015 (GLOBECOM 2015), pp. 1\u20136. IEEE, USA (2015)","DOI":"10.1109\/GLOCOM.2015.7417154"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Novak, E., Li, Q.: Near-PRI: private, proximity based location sharing. In: Proceedings of IEEE INFOCOM 2014, pp. 37\u201345. IEEE, Canada (2014)","DOI":"10.1109\/INFOCOM.2014.6847922"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: Proceedings of IEEE International Conference on Communications 2016 (ICC 2016), pp. 1\u20136. EEE, Malaysia (2016)","DOI":"10.1109\/ICC.2016.7511194"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-33167-1_21","volume-title":"Computer Security \u2013 ESORICS 2012","author":"Y Zheng","year":"2012","unstructured":"Zheng, Y., Li, M., Lou, W., Hou, Y.T.: SHARP: private proximity test and secure handshake with cheat-proof location tags. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 361\u2013378. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33167-1_21"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/TDSC.2015.2472529","volume":"14","author":"Y Zheng","year":"2017","unstructured":"Zheng, Y., Li, M., Lou, W., Hou, Y.T.: Location based handshake and private proximity test with location tags. IEEE Trans. Dependable Secure Comput. 14(4), 406\u2013419 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Sedenka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014 (ASIA CCS 2014), pp. 99\u2013110 (2014)","DOI":"10.1145\/2590296.2590307"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Andr\u00b4es, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 901\u2013914 (2013)","DOI":"10.1145\/2508859.2516735"},{"issue":"4","key":"4_CR12","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2015.2506145","volume":"11","author":"B Wang","year":"2016","unstructured":"Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704\u2013719 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2014.6863131","volume":"28","author":"R Lu","year":"2014","unstructured":"Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46\u201350 (2014)","journal-title":"IEEE Netw."},{"key":"4_CR14","unstructured":"The AVISPA Team: AVISPA v1.1 User Manual. http:\/\/www.avispa-project.org\/package\/user-manual.pdf . Accessed 21 Aug 2017"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theoret. Comput. Sci. 155, 61\u201386 (2006)","journal-title":"Electron. Notes Theoret. Comput. Sci."},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Grid and Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05928-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T14:52:54Z","timestamp":1694530374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05928-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,30]]},"ISBN":["9783030059279","9783030059286"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05928-6_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018,12,30]]},"assertion":[{"value":"SGIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Grid and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Niagara Falls, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sgiot2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sgiot.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}