{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T08:10:04Z","timestamp":1739088604188,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642017209"},{"type":"electronic","value":"9783642017216"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01721-6_16","type":"book-chapter","created":{"date-parts":[[2009,5,4]],"date-time":"2009-05-04T17:07:07Z","timestamp":1241456827000},"page":"254-270","source":"Crossref","is-referenced-by-count":5,"title":["LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System"],"prefix":"10.1007","author":[{"given":"Yongcai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Junhui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Toshikazu","family":"Fukushima","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Junhui, Z., Yongcai, W.: Autonomous Ultrasonic Indoor Tracking System. In: Proceedings of the 2008 International Conference on Intelligent Pervasive Computing (IPC 2008), Sydney, Australia (2008)"},{"issue":"10","key":"16_CR2","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1016\/j.comnet.2006.11.018","volume":"51","author":"G. Mao","year":"2007","unstructured":"Mao, G., Fidan, B., Anderson, B.D.: Wireless sensor network localization techniques. Comput. Netw.\u00a051(10), 2529\u20132553 (2007)","journal-title":"Comput. Netw."},{"key":"16_CR3","first-page":"645","volume-title":"PERCOM 2008","author":"J.J. Pan","year":"2008","unstructured":"Pan, J.J., Pan, S.J., Zheng, V.W., Yang, Q.: Digital Wall: A Power-efficient Solution for Location-based Data Sharing. In: PERCOM 2008, pp. 645\u2013650. IEEE Computer Society, Washington (2008)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-72037-9_10","volume-title":"Pervasive Computing","author":"A. Kapadia","year":"2007","unstructured":"Kapadia, A., Henderson, T., Fielding, J., Kotz, D.: Virtual walls: Protecting digital privacy in perva- sive environments. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 162\u2013179. Springer, Heidelberg (2007)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Capkun, Hubaux, J.P.: Secure positioning of wireless devices with application to sensor networks. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a03, pp. 1917\u20131928 (2005)","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.: RADAR: An in-building RF-based user location and tracking system. In: Proceedings of the Conference on Computer Communications, Tel Aviv, Israel, vol.\u00a02, pp. 775\u2013784 (2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"issue":"4","key":"16_CR7","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/TITB.2004.837887","volume":"8","author":"M.D. Rodrguez","year":"2004","unstructured":"Rodrguez, M.D., et al.: Location-Aware Access to Hospital Information and Services. IEEE Transactions onf Information Techonology in Biomedicine\u00a08(4), 448\u2013455 (2004)","journal-title":"IEEE Transactions onf Information Techonology in Biomedicine"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Cho, Y., Bao, L., et al.: LAAC: A Location-Aware Access Control Protocol. In: Proceedings of Third Annual International Conference on Mobile and Ubiquitous Systems, San Jose, CA, pp. 1\u20137 (2006)","DOI":"10.1109\/MOBIQ.2006.340425"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM workshop on Wireless security, New York, NY, USA, pp. 1\u201310 (2003)","DOI":"10.1145\/941311.941313"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proceedings of the 7th International Workshop on Security Protocols, London, UK, pp. 172\u2013194 (2000)","DOI":"10.1007\/10720107_24"},{"key":"16_CR11","unstructured":"Balfanz, D., et al.: Talking to strangers: Authentication in adhoc wireless networks (Feburary 2002)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Rasmussen, K.B., Capkun, S., Cagalj, M.: Secnav: secure broadcast localization and time synchronization in wireless networks. In: MobiCom 2007, New York, NY, USA, pp. 310\u2013313 (2007)","DOI":"10.1145\/1287853.1287892"},{"key":"16_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224","volume-title":"Wireless Communications","author":"A. Goldsmith","year":"2005","unstructured":"Goldsmith, A.: Wireless Communications. Cambridge University Press, Cambridge (2005)"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/11426646_7","volume-title":"Location- and Context-Awareness","author":"K. Lorincz","year":"2005","unstructured":"Lorincz, K., Welsh, M.: MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking. In: Strang, T., Linnhoff-Popien, C. (eds.) LoCA 2005. LNCS, vol.\u00a03479, pp. 63\u201382. Springer, Heidelberg (2005)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Savvides, A., Han, C., Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: MobiCom 2001, Rome, Italy, pp. 166\u2013179 (2001)","DOI":"10.1145\/381677.381693"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R. Want","year":"1992","unstructured":"Want, R., et al.: The Active Badge Location System. ACM Transactions on Information Systems (TOIS)\u00a010(1), 91\u2013102 (1992)","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Ward, A., Jones, A., Hopper, A.: A New Location Technique for the Active Office. IEEE Personal Communications\u00a04(5) (October 1997)","DOI":"10.1109\/98.626982"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket Location-Support System. In: ACM MobiCom 2000, Boston, Massachusetts, USA (August 2000)","DOI":"10.1145\/345910.345917"},{"key":"16_CR19","unstructured":"Naohisa, H., et al.: Assets Location Management Solution Based on the Combination of SmartLocator and RFID. NEC Technical Journal\u00a01(2) (2006)"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Duff, P., Muller, H.: Autocalibration Algorithm for Ultrasonic Location Systems. In: Proceedings of Seventh IEEE International Symposium on Wearable Computers (ISWC 2003) (2003)","DOI":"10.1109\/ISWC.2003.1241395"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11428572_1","volume-title":"Pervasive Computing","author":"J. Scott","year":"2005","unstructured":"Scott, J., Dragovic, B.: Audio Location: Accurate Low-Cost Location Sensing. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 1\u201318. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Location and Context Awareness"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01721-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T07:48:26Z","timestamp":1739087306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01721-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642017209","9783642017216"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01721-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}