{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:14:27Z","timestamp":1764782067803,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_37","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"590-593","source":"Crossref","is-referenced-by-count":6,"title":["POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET"],"prefix":"10.1007","author":[{"given":"Karim","family":"Emara","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Woerndl","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Schlichter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Emara, K.: Location privacy in vehicular networks. In: 2013 IEEE 14th International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20132, June 2013","DOI":"10.1109\/WoWMoM.2013.6583427"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Emara, K., Woerndl, W., Schlichter, J.: Beacon-based Vehicle Tracking in Vehicular Ad-hoc Networks. Tech. rep., TECHNISCHE UNIVERSIT\u00c4T M\u00dcNCHEN, April 2013. \n                    http:\/\/mediatum.ub.tum.de\/attfile\/1144541\/hd2\/incoming\/2013-Apr\/691293.pdf","DOI":"10.1109\/WoWMoM.2013.6583473"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Emara, K., Woerndl, W., Schlichter, J.: Vehicle tracking using vehicular network beacons. In: Fourth International Workshop on Data Security and PrivAcy in wireless Networks 2013 (D-SPAN 2013), Madrid, Spain, June 2013","DOI":"10.1109\/WoWMoM.2013.6583473"},{"key":"37_CR4","unstructured":"Emara, K., Woerndl, W., Schlichter, J.: Caps: context-aware privacy scheme for vanet safety applications. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2015, pp. 21: 1\u201321: 12. ACM, New York (2015). \n                    http:\/\/doi.acm.org\/10.1145\/2766498.2766500"},{"key":"37_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.comcom.2015.03.002","volume":"63","author":"K Emara","year":"2015","unstructured":"Emara, K., Woerndl, W., Schlichter, J.: On evaluation of location privacy preserving schemes for VANET safety applications. Computer Communications 63, 11\u201323 (2015)","journal-title":"Computer Communications"},{"key":"37_CR6","unstructured":"Freudiger, J., Raya, M., Flegyhzi, M., Papadimitratos, P., Hubaux, J.P.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, August 2007"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym Schemes in Vehicular Networks : A Survey. IEEE Communications Surveys & Tutorials (c), 1\u201331 (2014)","DOI":"10.1109\/COMST.2014.2345420"},{"key":"37_CR8","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: Caravan: providing location privacy for vanet. In: Embedded Security in Cars (ESCAR) (2005)"},{"key":"37_CR9","unstructured":"Uppoor, S., Fiore, M.: Vehicular mobility trace of the city of cologne, germany (2011). (accessed January 20, 2015) \n                    http:\/\/kolntrace.project.citi-lab.fr\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:27:39Z","timestamp":1559374059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_37","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}