{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:28Z","timestamp":1725560908158},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_13","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T07:36:56Z","timestamp":1280389016000},"page":"162-173","source":"Crossref","is-referenced-by-count":3,"title":["A Location Privacy Protection Mechanism for Smart Space"],"prefix":"10.1007","author":[{"given":"Yeongsub","family":"Cho","sequence":"first","affiliation":[]},{"given":"Sangrae","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Daeseon","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Seunghun","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Kyoil","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Cheehang","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"13_CR1","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"256","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The Computer for the Twenty-First Century. Scientific American\u00a0256(3), 94\u2013104 (1991)","journal-title":"Scientific American"},{"key":"13_CR2","unstructured":"Ha, W., et al.: Confusion of Physical Space and Electronic Space: Ubiquitous IT Revolution and the Third Space. Korean Electronic Times (2002)"},{"key":"13_CR3","unstructured":"Sakamura, K.: Ubiquitous Computing. Dongbang Media Books (2002)"},{"key":"13_CR4","unstructured":"Techno-Economics Research Department.: Ubicomp Research Trends. ETRI (2002)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"key":"13_CR6","unstructured":"Al-Muhtadi, J., et al.: A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. In: IEEE ICDCSW Proc of the 22nd (2002)"},{"key":"13_CR7","unstructured":"Hengartner, U., Steenkiste, P.: Protection People Location Information. In: Proc. of Workshop on Security in Ubiquitous Computing (September 2002)"},{"issue":"1","key":"13_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., et al.: Preserving Privacy in Environments with Location-Based Applications. Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"Pervasive Computing"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"13_CR10","unstructured":"OECD.: Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data (September 1980)"},{"key":"13_CR11","unstructured":"European Commission.: Directive 95\/46\/ec of the European parliament and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (November 1995)"},{"key":"13_CR12","unstructured":"Cranor, L., et al.: The Platform for privacy preferences 1.0(P3P1.0) specification. W3C Recommendation (April 2002), HTML Version at \n                    \n                      http:\/\/www.w3.org\/TR\/P3P\/"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T13:41:23Z","timestamp":1552830083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}