{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:54:34Z","timestamp":1762005274140,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030670863"},{"type":"electronic","value":"9783030670870"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67087-0_2","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T01:17:39Z","timestamp":1610587059000},"page":"11-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hide Me: Enabling Location Privacy in Heterogeneous Vehicular Networks"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Meuser","sequence":"first","affiliation":[]},{"given":"Oluwasegun Taiwo","family":"Ojo","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Bischoff","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Fern\u00e1ndez Anta","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Stavrakakis","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Steinmetz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,14]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Meuser, T., Bischoff, D., Richerzhagen, B., Steinmetz, R.: Cooperative offloading in context-aware networks: a game-theoretic approach. In: Proceedings of ACM International Conference on Distributed and Event-Based Systems (DEBS 2019). ACM (2019)","DOI":"10.1145\/3328905.3338535"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D., Staddon, J.: Detecting and correcting malicious data in VANETs. In: Proceedings of ACM International Workshop on Vehicular Ad Hoc Networks (VANET), VANET 2004, pp. 29\u201337. ACM, New York (2004)","DOI":"10.1145\/1023875.1023881"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/11767831_13","volume-title":"Privacy Enhancing Technologies","author":"F D\u00f6tzer","year":"2006","unstructured":"D\u00f6tzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 197\u2013209. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767831_13"},{"issue":"12","key":"2_CR4","doi-asserted-by":"publisher","first-page":"5631","DOI":"10.1109\/TVT.2015.2487262","volume":"64","author":"B Ying","year":"2015","unstructured":"Ying, B., Makrakis, D., Hou, Z.: Motivation for protecting selfish vehicles\u2019 location privacy in vehicular networks. IEEE Trans. Veh. Technol. 64(12), 5631\u20135641 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2012","unstructured":"Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506\u20131519 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Ying, B., Nayak, A.: Social location privacy protection method in vehicular social networks. In: Proceedings of IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1288\u20131292 (2017)","DOI":"10.1109\/ICCW.2017.7962836"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/s11036-009-0175-4","volume":"15","author":"A Wasef","year":"2010","unstructured":"Wasef, A., Shen, X.S.: REP: location privacy for VANETs using random encryption periods. Mobile Netw. Appl. 15(1), 172\u2013185 (2010)","journal-title":"Mobile Netw. Appl."},{"key":"2_CR8","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: providing location privacy for VANET. In: Embedded Security in Cars (ESCAR) (2005)"},{"issue":"12","key":"2_CR9","doi-asserted-by":"publisher","first-page":"9942","DOI":"10.1109\/TVT.2016.2531185","volume":"65","author":"B Liu","year":"2016","unstructured":"Liu, B., Zhou, W., Zhu, T., Gao, L., Luan, T.H., Zhou, H.: Silence is golden: enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks. IEEE Trans. Veh. Technol. 65(12), 9942\u20139953 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/COMST.2014.2345420","volume":"17","author":"J Petit","year":"2014","unstructured":"Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17(1), 228\u2013255 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Gerlach, M., Guttler, F.: Privacy in VANETs using changing pseudonyms - ideal and real. In: Proceedings of IEEE Vehicular Technology Conference (VTC-Spring), April 2007, pp. 2521\u20132525 (2007)","DOI":"10.1109\/VETECS.2007.519"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Palanisamy, B., Liu, L.: MobiMix: protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 494\u2013505 (2011)","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"2_CR13","unstructured":"Freudiger, J., Raya, M., F\u00e9legyh\u00e1zi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-zones for location privacy in vehicular networks. In: Proceedings of ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS) (2007)"},{"issue":"8","key":"2_CR14","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/LCOMM.2013.070113.122816","volume":"17","author":"B Ying","year":"2013","unstructured":"Ying, B., Makrakis, D., Mouftah, H.T.: Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 17(8), 1524\u20131527 (2013)","journal-title":"IEEE Commun. Lett."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: Proceedings of International Conference on Wireless On-Demand Network Systems and Services (WONS), pp. 176\u2013183 (2010)","DOI":"10.1109\/WONS.2010.5437115"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Duckham, M., Kulik, L.: Location privacy and location-aware computing. In: Dynamic and Mobile GIS, pp. 63\u201380. CRC Press (2006)","DOI":"10.1201\/9781420008609-11"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of International Conference on Mobile Systems, Applications and Services (MobiSys), pp. 31\u201342. ACM, New York (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 754\u2013762, April 2014","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, K., Guo, L., Li, X., Fang, Y.: A game-theoretic approach for achieving k-anonymity in location based services. In: Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 2985\u20132993 (2013)","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Manshaei, M.H., Hubaux, J.-P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 324\u2013337. ACM, New York (2009)","DOI":"10.1145\/1653662.1653702"},{"issue":"3","key":"2_CR21","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s12083-012-0127-9","volume":"7","author":"S Du","year":"2012","unstructured":"Du, S., Li, X., Du, J., Zhu, H.: An attack-and-defence game for security assessment in vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 7(3), 215\u2013228 (2012). https:\/\/doi.org\/10.1007\/s12083-012-0127-9","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"12","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1109\/TPDS.2006.171","volume":"17","author":"N Laoutaris","year":"2006","unstructured":"Laoutaris, N., Telelis, O., Zissimopoulos, V., Stavrakakis, I.: Distributed selfish replication. IEEE Trans. Parallel Distrib. Syst. 17(12), 1401\u20131413 (2006)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Meuser, T., Bischoff, D., Steinmetz, R., Richerzhagen, B.: Simulation platform for connected heterogeneous vehicles. In: Proceedings of International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS). SCITEPRESS, May 2019, pp. 412\u2013419 (2019)","DOI":"10.5220\/0007713004120419"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Lopez, P.A., et al.: Microscopic traffic simulation using SUMO. In: Proceedings of IEEE ITSC. IEEE (2018)","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Uppoor, S., Fiore, M.: Large-scale urban vehicular mobility for networking research. In: Proceedings of IEEE Vehicular Networking Conference (VNC), pp. 62\u201369 (2011)","DOI":"10.1109\/VNC.2011.6117125"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67087-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T11:48:40Z","timestamp":1618832920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-67087-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030670863","9783030670870"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67087-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NETYS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Networked Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakech","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"netys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/netys.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually. Three invited papers are also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}