{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:34:38Z","timestamp":1740548078619,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540234234"},{"type":"electronic","value":"9783540301783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30178-3_25","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T19:55:07Z","timestamp":1285271707000},"page":"264-274","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Framework for User Privacy in Heterogeneous Location Networks"],"prefix":"10.1007","author":[{"given":"Harikrishna","family":"Vasanta","sequence":"first","affiliation":[]},{"given":"Yiu Shing Terry","family":"Tin","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Looi","sequence":"additional","affiliation":[]},{"given":"Juan Manuel","family":"Gonz\u00e1lez Nieto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"3GPP. LCS service description, Stage1 (2003)"},{"key":"25_CR2","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Server centric P3P. In: W3C Workshop on the Future of P3P (November 2002)"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2), pp. 775\u2013784 (2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"25_CR4","first-page":"57","volume-title":"27th Symposium on Theory of Computing","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution: The three party case. In: 27th Symposium on Theory of Computing, pp. 57\u201366. ACM, New York (1995)"},{"key":"25_CR5","unstructured":"Carney, D.: Location privacy protection act of 2001. Tech Law Journal (2001)"},{"key":"25_CR6","unstructured":"Chen, G., Kotz, D.: A survey of context-aware mobile computing research. Technical report, Dept. of Computer Science, Dartmouth College (November 2000)"},{"issue":"3","key":"25_CR7","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF01200848","volume":"1","author":"D.A. Cooper","year":"1995","unstructured":"Cooper, D.A., Birman, K.P.: The design and implementation of a private message service for mobile computers. Wireless Networks\u00a01(3), 297\u2013309 (1995)","journal-title":"Wireless Networks"},{"key":"25_CR8","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The platform for privacy preferences 1.0 (P3P1.0) specification. Technical Report REC-P3P-20020416\/ (April 2002)"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Cuellar Jr, J., Morris, J.B., Mulligan, D., Peterson, J., Polk, J.: Internet-Drafts: Geographic Location\/Privacy (GeoPriv) requirements. Technical report (March 2003)","DOI":"10.17487\/rfc3693"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/197917.197929","volume-title":"Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing","author":"A.J. Demers","year":"1994","unstructured":"Demers, A.J.: Research issues in ubiquitous computing. In: Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing, pp. 2\u20138. ACM Press, New York (1994)"},{"key":"25_CR11","unstructured":"ETSI. GSM 02.60 - LCS Stage-1 Service Description. GSM Technical Specificaton (April 1999)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Gellens, R.: Wireless device configaration(OTASP\/OTAPA) via ACAP (1999)","DOI":"10.17487\/rfc2604"},{"key":"25_CR13","unstructured":"Gemplus. GPK Reference Manual (1999)"},{"key":"25_CR14","unstructured":"Kempf, J., Ackerman, L., Miki, T.: Wireless location privacy: A report on law and policy in the USA, the European Union, and Japan. Technical report (November 2003)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Personal location agent for communicating entities (PLACE)","author":"J. Lin","year":"2002","unstructured":"Lin, J., Laddaga, R., Naito, H.: Personal location agent for communicating entities (PLACE). LNCS. Springer, Heidelberg (2002)"},{"key":"25_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/501158.501164","volume-title":"Proceedings of the 3rd ACM conference on Electronic Commerce","author":"E. Snekkenes","year":"2001","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM conference on Electronic Commerce, pp. 48\u201357. ACM Press, New York (2001)"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-540-27800-9_31","volume-title":"Information Security and Privacy","author":"T. Tin","year":"2004","unstructured":"Tin, T., Vasanta, H., Boyd, C., Nieto, J.: Protocols with security proofs for mobile applications. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 358\u2013369. Springer, Heidelberg (2004)"},{"key":"25_CR18","unstructured":"Justice Department USA. The privacy act of 1974"},{"issue":"1","key":"25_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R. Want","year":"1992","unstructured":"Want, R., Hopper, A., Falc\u00e3o, V., Gibbons, J.: The active badge location system. ACM Transactions on Information Systems (TOIS)\u00a010(1), 91\u2013102 (1992)","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"25_CR20","unstructured":"WAP and W3C. Report from WAP-W3C joint workshop on mobile web privacy. Technical report, WAP and W3C (2000)"}],"container-title":["Lecture Notes in Computer Science","Mobility Aware Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30178-3_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:59:16Z","timestamp":1740531556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30178-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540234234","9783540301783"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30178-3_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}