{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:37:03Z","timestamp":1740202623610,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642126062"},{"type":"electronic","value":"9783642126079"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12607-9_27","type":"book-chapter","created":{"date-parts":[[2010,6,7]],"date-time":"2010-06-07T15:07:27Z","timestamp":1275923247000},"page":"366-373","source":"Crossref","is-referenced-by-count":0,"title":["ProVer: A Secure System for the Provision of Verified Location Information"],"prefix":"10.1007","author":[{"given":"Michelle","family":"Graham","sequence":"first","affiliation":[]},{"given":"David","family":"Gray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"LBSZone (2009), http:\/\/www.lbszone.com"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Supporting location-based conditions in access control policies. In: ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 212\u2013222 (2006)","DOI":"10.1145\/1128817.1128850"},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R. Want","year":"1992","unstructured":"Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst.\u00a010(1), 91\u2013102 (1992)","journal-title":"ACM Trans. Inf. Syst."},{"issue":"5","key":"27_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/98.626982","volume":"4","author":"A. Ward","year":"1997","unstructured":"Ward, A., Jones, A.: A new location technique for the active office. Personal Communications of the IEEE\u00a04(5), 42\u201347 (1997)","journal-title":"Personal Communications of the IEEE"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Correal, N.S., Kyperountas, S., Shi, Q., Welborn, M.: An uwb relative location system. In: IEEE Conference on Ultra Wideband Systems and Technologies, pp. 394\u2013397 (2003)","DOI":"10.1109\/UWBST.2003.1267871"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.N.: Radar: An in-building rf-based user location and tracking system. In: INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 775\u2013784 (2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"27_CR7","first-page":"32","volume-title":"MobiCom 2000: Proceedings of the 6th annual international conference on Mobile computing and networking","author":"N.B. Priyantha","year":"2000","unstructured":"Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: MobiCom 2000: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 32\u201343. ACM, New York (2000)"},{"key":"27_CR8","unstructured":"Waters, B., Felten, E.: Secure, private proofs of location. Technical report, Princeton University (January 2003)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Sastry, N., Wagner, D.: Secure verification of location claims. In: WiSe 2003: Proceedings of the 2nd ACM workshop on Wireless security, pp. 1\u201310 (2003)","DOI":"10.1145\/941311.941313"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TDSC.2006.57","volume":"3","author":"A. Vora","year":"2006","unstructured":"Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Transactions on Dependable and Secure Computing\u00a03, 377\u2013385 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM 2006), pp. 1\u201310 (2006)","DOI":"10.1109\/INFOCOM.2006.302"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"\u010capkun, S., Rasmussen, K., \u010cagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. In: IEEE Educational Activities Department, vol.\u00a07, pp. 470\u2013483 (2008)","DOI":"10.1109\/TMC.2007.70782"},{"key":"27_CR13","unstructured":"Capkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical report, EFPL (2004)"},{"issue":"6","key":"27_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/65.967595","volume":"15","author":"M. Mauve","year":"2001","unstructured":"Mauve, M., Widmer, A., Hartenstein, H.: A survey on position-based routing in mobile ad hoc networks. IEEE Network\u00a015(6), 30\u201339 (2001)","journal-title":"IEEE Network"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"27_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-03417-6_37","volume-title":"Wireless Algorithms, Systems, and Applications","author":"M. Graham","year":"2009","unstructured":"Graham, M., Gray, D.: Can you see me? the use of a binary visibility metric in distance bounding. In: Liu, B., Bestavros, A., Du, D.-Z., Wang, J. (eds.) Wireless Algorithms, Systems, and Applications. LNCS, vol.\u00a05682, pp. 378\u2013387. Springer, Heidelberg (2009)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Graham, M., Gray, D.: Protecting privacy and securing the gathering of location proofs - the secure location verification proof gathering protocol. In: Proceedings of the 1st International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009) (June 2009)","DOI":"10.1007\/978-3-642-04434-2_14"},{"key":"27_CR18","unstructured":"Josang, A., Ismail, R.: The beta reputation system. In: e-Reality: Constructing the Economy (June 2002)"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.Y.L.: A robust reputation system for mobile ad-hoc networks. Technical report (2003)","DOI":"10.1201\/9780203504086.ch20"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols. In: IEEE Computer Security Foundations Workshop, p. 18 (1997)","DOI":"10.1109\/CSFW.1997.596779"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Roscoe, A.W.: Modelling and verifying key-exchange protocols using csp and fdr. In: Computer Security Foundations Workshop, p. 98 (1995)","DOI":"10.1109\/CSFW.1995.518556"},{"key":"27_CR22","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/1455770.1455791","volume-title":"CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security","author":"K.B. Rasmussen","year":"2008","unstructured":"Rasmussen, K.B., \u010capkun, S.: Location privacy of distance bounding protocols. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 149\u2013160. ACM Press, New York (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Computing, Applications, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12607-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:57:41Z","timestamp":1740164261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12607-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642126062","9783642126079"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12607-9_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}