{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:46:16Z","timestamp":1774539976000,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319714691","type":"print"},{"value":"9783319714707","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,12,9]],"date-time":"2017-12-09T00:00:00Z","timestamp":1512777600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-71470-7_14","type":"book-chapter","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T08:47:48Z","timestamp":1512722868000},"page":"269-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Captcha Your Location Proof\u2014A Novel Method for Passive Location Proofs in Adversarial Environments"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Bucher","sequence":"first","affiliation":[]},{"given":"David","family":"Rudi","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9","family":"Buffat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Anderson M,\u00a0Magruder J (2012) Learning from the crowd: regression discontinuity estimates of the effects of an online review database*. Econ J 122(563):957\u2013989. http:\/\/dx.doi.org\/10.1111\/j.1468-0297.2012.02512.x","DOI":"10.1111\/j.1468-0297.2012.02512.x"},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume":"765","author":"S Brands","year":"1994","unstructured":"Brands S, Chaum D (1994) Distance-bounding protocols. Lect Notes Comput Sci 765:344\u2013359","journal-title":"Lect Notes Comput Sci"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Brown M, Lowe DG (2007) Automatic panoramic image stitching using invariant features. Int J Comput Vis 74(1):59\u201373. https:\/\/doi.org\/10.1007\/s11263-006-0002-3","DOI":"10.1007\/s11263-006-0002-3"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Bucher D,\u00a0Scheider S,\u00a0Raubal M (2017) A model and framework for matching complementary spatio-temporal needs. In: Proceedings of the 25th ACM SIGSPATIAL international conference on advances in geographic information systems. ACM","DOI":"10.1145\/3139958.3140038"},{"key":"14_CR5","unstructured":"Francillon A,\u00a0Danev B,\u00a0Capkun S (2011) Relay attacks on passive keyless entry and start systems in modern cars. In: Proceedings of the 18th annual network and distributed system security symposium. the internet society. Citeseer"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Gao H, Lewis RM,\u00a0Li Q (2012) Location proof via passive RFID tags. Springer, Berlin, Heidelberg, pp 500\u2013511","DOI":"10.1007\/978-3-642-31869-6_43"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Hu N,\u00a0Liu L,\u00a0Sambamurthy V (2011) Fraud detection in online consumer reviews. Decis Support Syst 50(3):614\u2013626. On quantitative methods for detection of financial fraud. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167923610001363","DOI":"10.1016\/j.dss.2010.08.012"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Javali C,\u00a0Revadigar G,\u00a0Hu W,\u00a0Jha S (2015) Poster: were you in the cafe yesterday?: location proof generation and verification for mobile users. In: Proceedings of the 13th ACM conference on embedded networked sensor systems. ACM, pp 429\u2013430","DOI":"10.1145\/2809695.2817898"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Javali C,\u00a0Revadigar G, Rasmussen KB,\u00a0Hu W,\u00a0Jha S (2016) I am Alice, I was in wonderland: secure location proof generation and verification protocol. In: 2016 IEEE 41st conference on local computer networks (LCN), Nov 2016, pp 477\u2013485","DOI":"10.1109\/LCN.2016.126"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Khan R,\u00a0Zawoad S, Haque MM,\u00a0Hasan R (2014) Who, when, and where? Location proof assertion for mobile devices. In: IFIP annual conference on data and applications security and privacy. Springer, pp 146\u2013162","DOI":"10.1007\/978-3-662-43936-4_10"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110. https:\/\/doi.org\/10.1023\/B:VISI.0000029664.99615.94","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Luo W,\u00a0Hengartner U (2010) Veriplace: a privacy-aware location proof architecture. In: Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems, GIS \u201910. ACM, New York, NY, USA, pp 23\u201332. http:\/\/doi.acm.org\/10.1145\/1869790.1869797","DOI":"10.1145\/1869790.1869797"},{"issue":"8","key":"14_CR13","doi-asserted-by":"crossref","first-page":"2421","DOI":"10.1257\/aer.104.8.2421","volume":"104","author":"D Mayzlin","year":"2014","unstructured":"Mayzlin D, Dover Y, Chevalier J (2014) Promotional reviews: an empirical investigation of online review manipulation. Am Econ Rev 104(8):2421\u20132455","journal-title":"Am Econ Rev"},{"issue":"3","key":"14_CR14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/CC.2016.7445515","volume":"13","author":"L Mengjun","year":"2016","unstructured":"Mengjun L, Shubo L, Rui Z, Yongkai L, Jun W, Hui C (2016) Privacy-preserving distributed location proof generating system. China Commun 13(3):203\u2013218","journal-title":"China Commun"},{"issue":"1","key":"14_CR15","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1111\/j.1538-4632.2005.00575.x","volume":"37","author":"HJ Miller","year":"2005","unstructured":"Miller HJ (2005) A measurement theory for time geography. Geogr Anal 37(1):17\u201345","journal-title":"Geogr Anal"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Saroiu S,\u00a0Wolman A (2009) Enabling new mobile applications with location proofs. In: Proceedings of the 10th workshop on mobile computing systems and applications, HotMobile \u201909. ACM, New York, NY, USA, pp 3:1\u20133:6. http:\/\/doi.acm.org\/10.1145\/1514411.1514414","DOI":"10.1145\/1514411.1514414"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sastry N,\u00a0Shankar U,\u00a0Wagner D (2003) Secure verification of location claims. In: Proceedings of the 2nd ACM workshop on wireless security, WiSe \u201903. ACM,\u00a0New York, NY, USA, pp 1\u201310. http:\/\/doi.acm.org\/10.1145\/941311.941313","DOI":"10.1145\/941311.941313"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Talasila M,\u00a0Curtmola R,\u00a0Borcea C (2013) Improving location reliability in crowd sensed data with minimal efforts. In: 2013 6th Joint IFIP wireless and mobile networking conference (WMNC). IEEE, pp 1\u20138","DOI":"10.1109\/WMNC.2013.6549016"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Von\u00a0Ahn L,\u00a0Blum M, Hopper NJ,\u00a0Langford J (2003) Captcha: using hard AI problems for security. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 294\u2013311","DOI":"10.1007\/3-540-39200-9_18"},{"issue":"6","key":"14_CR20","doi-asserted-by":"crossref","first-page":"3276","DOI":"10.1109\/TNET.2016.2515119","volume":"24","author":"X Wang","year":"2016","unstructured":"Wang X, Pande A, Zhu J, Mohapatra P (2016) Stamp: enabling privacy-preserving location proofs for mobile users. IEEE\/ACM Trans Netw 24(6):3276\u20133289","journal-title":"IEEE\/ACM Trans Netw"},{"key":"14_CR21","unstructured":"Waters B,\u00a0Felten E (2003) Proving the location of tamper-resistant devices. Technical Report"},{"key":"14_CR22","unstructured":"Waters B,\u00a0Felten E (2003) Secure, private proofs of location. Technical report"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Weiser P,\u00a0Bucher D,\u00a0Cellina F,\u00a0De\u00a0Luca V (2015) A taxonomy of motivational affordances for meaningful gamified and persuasive technologies. In: Proceedings of the 3rd international conference on ICT for sustainability (ICT4S). Advances in computer science research, vol\u00a022. Atlantis Press, Paris, pp 271\u2013280","DOI":"10.2991\/ict4s-env-15.2015.31"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Ye Q,\u00a0Law R,\u00a0Gu B,\u00a0Chen W (2011) The influence of user-generated content on traveler behavior: an empirical investigation on the effects of e-word-of-mouth to hotel online bookings. Comput Hum Behav 27(2):634\u2013639. Web 2.0 in travel and tourism: empowering and changing the role of travelers. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563210000907","DOI":"10.1016\/j.chb.2010.04.014"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Zhu Z,\u00a0Cao G (2011) Applaus: a privacy-preserving location proof updating system for location-based services. In: 2011 Proceedings IEEE INFOCOM, Apr 2011, pp 1889\u20131897","DOI":"10.1109\/INFCOM.2011.5934991"}],"container-title":["Lecture Notes in Geoinformation and Cartography","Progress in Location Based Services 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71470-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T14:23:50Z","timestamp":1570458230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71470-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,9]]},"ISBN":["9783319714691","9783319714707"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71470-7_14","relation":{},"ISSN":["1863-2246","1863-2351"],"issn-type":[{"value":"1863-2246","type":"print"},{"value":"1863-2351","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,9]]}}}