{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:18:57Z","timestamp":1756383537101},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030217518"},{"type":"electronic","value":"9783030217525"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-21752-5_10","type":"book-chapter","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T01:02:41Z","timestamp":1559869361000},"page":"151-160","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Digital Forensics and Privacy-by-Design: Example in a Blockchain-Based Dynamic Navigation System"],"prefix":"10.1007","author":[{"given":"David","family":"Billard","sequence":"first","affiliation":[]},{"given":"Baptiste","family":"Bartolomei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Decoster, K., Billard, D. (eds.): HACIT: a privacy preserving and low cost solution for dynamic navigation and forensics in VANET. In: 2018 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS) (2018)","DOI":"10.5220\/0006778404540461"},{"key":"10_CR2","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-030-05888-3_21","volume-title":"Ad Hoc Networks","author":"D Kevin","year":"2019","unstructured":"Kevin, D., David, B.: HACIT2: a privacy preserving, region based and blockchain application for dynamic navigation and forensics in VANET. In: Zheng, J., Xiang, W., Lorenz, P., Mao, S., Yan, F. (eds.) ADHOCNETS 2018. LNICST, vol. 258, pp. 225\u2013236. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05888-3_21"},{"key":"10_CR3","unstructured":"Gartner: Leading the IoT e-Book. https:\/\/www.gartner.com\/en\/publications\/iot-business . Accessed 31 Oct 2018"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Rioche, J.: L\u2019enjeu de la s\u00e9curit\u00e9 des objets connect\u00e9s, I2D \u2013 Inf. Donn\u00e9es Doc., vol. 54, no. 3, pp. 64\u201365, October 2017","DOI":"10.3917\/i2d.173.0064"},{"key":"10_CR5","unstructured":"Reporting and Analysis Centre for Information Assurance (MELANI): Data leaks, crimeware and attacks on industrial control systems \u2013 topics in the MELANI semi-annual report. https:\/\/www.melani.admin.ch\/ . Accessed 31 Oct 2018"},{"key":"10_CR6","unstructured":"The DDoS Attack Against Dyn One Year Later. https:\/\/www.forbes.com\/sites\/davelewis\/2017\/10\/23\/the-ddos-attackagainst-dyn-one-year-later\/#44f2b8311ae9 . Accessed 31 Oct 2018"},{"key":"10_CR7","unstructured":"C. for D. and R. Health: Safety Communications - Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott\u2019s (formerly St. Jude Medical\u2019s) Implantable Cardiac Pacemakers: FDA Safety Communication, 29 August 2017"},{"key":"10_CR8","unstructured":"Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: 2004 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127\u2013131 (2004)"},{"key":"10_CR9","unstructured":"P.O. of the E. Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance), 27 April 2016"},{"key":"10_CR10","unstructured":"Guegan, D.: The Digital World: II \u2013 Alternatives to the Bitcoin Blockchain?, June 2018"},{"key":"10_CR11","unstructured":"IBM: IBM Blockchain Platform (2017). https:\/\/ibm-blockchain.github.io\/develop\/ . Accessed 04 Oct 2018"},{"key":"10_CR12","unstructured":"Linux Foundation: HyperLedger Fabric docs (2016). https:\/\/hyperledger-fabric.readthedocs.io\/en\/release\/ . Accessed 26 Sept 2018"},{"key":"10_CR13","unstructured":"Hyperledger-fabric: Membership Service Providers (MSP)\u2014hyperledger-fabricdocs master documentation (2018).. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-1.3\/msp.html . Accessed 31 Oct 2018"},{"key":"10_CR14","unstructured":"Hyperledger-fabric: Chaincode tutorials - hyperledger-fabricdocs master documentation (2018). https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-1.3\/chaincode.html . Accessed 31 Oct 2018"},{"key":"10_CR15","unstructured":"OpenStreetMap: OpenStreetMap (2018). https:\/\/www.openstreetmap.org\/ . [Accessed: 31-Oct-2018]"},{"key":"10_CR16","unstructured":"GraphHopper: GraphHopper Directions API with Route Optimization,\u201d GraphHopper Directions API (2018). https:\/\/www.graphhopper.com\/ . Accessed 31 Oct 2018"},{"key":"10_CR17","unstructured":"OsmAnd: OsmAnd - Offline Mobile Maps and Navigation (2018). https:\/\/osmand.net\/ . Accessed 31 Oct 2018"},{"key":"10_CR18","unstructured":"On the effectiveness of an opportunistic traffic management system for vehicular networks. IEEE J. Mag. https:\/\/ieeexplore.ieee.org\/document\/5970119 . Accessed 15 Nov 2018"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Garip, M.T., Gursoy, M.E., Reiher, P., Gerla, M.: Scalable reactive vehicle-to-vehicle congestion avoidance mechanism. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 943\u2013948 (2015)","DOI":"10.1109\/CCNC.2015.7158103"},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"668","DOI":"10.3390\/s17040668","volume":"17","author":"L Wang","year":"2017","unstructured":"Wang, L., Liu, G., Sun, L.: A secure and privacy-preserving navigation scheme using spatial crowdsourcing in fog based VANETs. Sensors 17(4), 668 (2017)","journal-title":"Sensors"},{"issue":"1","key":"10_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"10_CR22","first-page":"184","volume":"13","author":"PK Sharma","year":"2017","unstructured":"Sharma, P.K., Moon, S.Y., Park, J.H.: Block-VN: a distributed blockchain based vehicular network architecture in smart city. J. Inf. Process. Syst. 13(1), 184\u2013195 (2017)","journal-title":"J. Inf. Process. Syst."},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Leiding, B., Memarmoshrefi, B., Hogrefe, D.: Self-managed and blockchain-based vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, New York, NY, USA, pp. 137\u2013140 (2016)","DOI":"10.1145\/2968219.2971409"},{"issue":"3","key":"10_CR24","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.endeavour.2005.04.006","volume":"29","author":"JD Aronson","year":"2005","unstructured":"Aronson, J.D.: DNA fingerprinting on trial: the dramatic early history of a new forensic technique. Endeavour 29(3), 126\u2013131 (2005)","journal-title":"Endeavour"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.forsciint.2015.03.022","volume":"251","author":"DA Stoney","year":"2015","unstructured":"Stoney, D.A., Stoney, P.L.: Critical review of forensic trace evidence analysis and the need for a new approach. Forensic Sci. Int. 251, 159\u2013170 (2015)","journal-title":"Forensic Sci. Int."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Bahsoun, J., Guerraoui, R., Shoker, A.: Making BFT protocols really adaptive. In: 2015 IEEE International Parallel and Distributed Processing Symposium, pp. 904\u2013913 (2015)","DOI":"10.1109\/IPDPS.2015.21"},{"issue":"4","key":"10_CR27","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"10_CR28","unstructured":"CC 235.1 Federal Act of 19 June 1992 on Data Protection (FADP), 19 June 1992. https:\/\/www.admin.ch\/opc\/en\/classifiedcompilation\/19920153\/index.html . Accessed 31 Oct 2018"},{"key":"10_CR29","unstructured":"Hafsi, S.: L\u2019exploitation des traces dans les accidents de la circulation. University of Lausanne, Lausanne (2011)"},{"key":"10_CR30","unstructured":"RS 221.229.1 Loi f\u00e9d\u00e9rale du 2 avril 1908 sur le contrat d\u2019assurance (Loi sur le contrat d\u2019assurance, LCA), 02 April 1908. https:\/\/www.admin.ch\/opc\/fr\/classifiedcompilation\/19080008\/index.html . Accessed 31 Oct 2018"},{"key":"10_CR31","unstructured":"Hern, A.: Google \u2018betrays patient trust\u2019 with DeepMind Health move, The Guardian, 14 November 2018"},{"key":"10_CR32","unstructured":"ASA: Versements \u00e9vit\u00e9s de 24 millions de francs d\u2019indemnit\u00e9s injustifi\u00e9s, ASA (2018). https:\/\/www.svv.ch\/fr\/newsroom\/versements-evites-de-24-millions-de-francs-dindemnites-injustifies . Accessed 31 Oct 2018"},{"key":"10_CR33","unstructured":"Gershgorn, D.: A life insurance giant is asking customers to wear health trackers,\u201d Quartz. https:\/\/qz.com\/1396035\/lifeinsurance-giant-john-hancock-is-asking-customers-to-wear-healthtrackers\/ . Accessed 31 Oct 2018"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-21752-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T19:37:30Z","timestamp":1574883450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-21752-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030217518","9783030217525"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-21752-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual Privacy Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apf2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/privacyforum.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}