{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:26:44Z","timestamp":1725564404074},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642153839"},{"type":"electronic","value":"9783642153846"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15384-6_60","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T11:24:42Z","timestamp":1283685882000},"page":"566-575","source":"Crossref","is-referenced-by-count":13,"title":["LocPriS: A Security and Privacy Preserving Location Based Services Development Framework"],"prefix":"10.1007","author":[{"given":"Gareth","family":"Ayres","sequence":"first","affiliation":[]},{"given":"Rashid","family":"Mehmood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","unstructured":"Woody, L.A., Acker, L., Curran, W., Susi, S., Velazquez, M.: The Impact of the FCC\u2019s Position on Wireless E911"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Hightower, J., Borriello, G.: A Survey and Taxonomy of Location Systems for Ubiquitous Computing, pp. 57\u201366 (2001)","DOI":"10.1109\/2.940014"},{"key":"60_CR3","volume-title":"Mobile Computing and Networking","author":"N.B. Priyantha","year":"2000","unstructured":"Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: Mobile Computing and Networking, ACM, Boston (2000)"},{"key":"60_CR4","unstructured":"Bahl, P., Padmanabhan, V.N.: RADAR: an in-building RF-based user location and tracking system (2000)"},{"key":"60_CR5","unstructured":"Nations, U.: Universal Declaration of Human Rights, General Assembly Resolution 217 A (III) (1948)"},{"key":"60_CR6","unstructured":"Grlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing. Privacy, Security and Trust within the Context of Pervasive Computing (2004)"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 84\u201388 (1981)","DOI":"10.1145\/358549.358563"},{"key":"60_CR8","unstructured":"Report, F.: Surviving the privacy revolution.: Deering, S., ICMP Router Discovery Messages, RFC 1256 (2002)"},{"key":"60_CR9","volume-title":"Mobile Systems, Applications and Services","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Mobile Systems, Applications and Services, ACM, New York (2003)"},{"key":"60_CR10","first-page":"10","volume-title":"Pervasive Computing","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: U.o.C.: Location Privacy in Pervasive Computing. In: Pervasive Computing, p. 10. IEEE, Los Alamitos (2003)"},{"key":"60_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1096166.1096174","volume":"9","author":"S. Kurkowski","year":"2005","unstructured":"Kurkowski, S., Camp, T., Colagrosso, M.: MANET simulation studies: the incredibles. SIGMOBILE Mob. Comput. Commun.\u00a09, 50\u201361 (2005)","journal-title":"SIGMOBILE Mob. Comput. Commun."},{"key":"60_CR12","unstructured":"Danezis, G., Lewis, S., Anderson, R.: How much is location privacy worth (2005)"},{"key":"60_CR13","first-page":"109","volume-title":"Privacy in the Electronic Society","author":"C. Dan","year":"2006","unstructured":"Dan, C., George, D.: A Study on The Value of Location Privacy. In: Privacy in the Electronic Society, pp. 109\u2013118. ACM, New York (2006)"},{"key":"60_CR14","first-page":"81","volume-title":"Proceedings of the SIGCHI","author":"S. Consolvo","year":"2005","unstructured":"Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI, pp. 81\u201390. ACM, New York (2005)"},{"key":"60_CR15","unstructured":"Barkhuus, L., Dey, A.: Location-Based Services for Mobile Telephony: a study of users\u2019 privacy concerns. In: Proceedings of the 9th IFIP TC13, p. 709, p. 712 (2003)"},{"key":"60_CR16","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1145\/765891.765952","volume-title":"CHI 2003","author":"S. Lederer","year":"2003","unstructured":"Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI 2003, pp. 724\u2013725. ACM, New York (2003)"},{"key":"60_CR17","doi-asserted-by":"crossref","unstructured":"Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints. In: Communications Infrastructure. Systems and Applications in Europe, LNICST, vol. 16, pp175\u2013188 (December 2009)","DOI":"10.1007\/978-3-642-11284-3_18"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based and Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15384-6_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:06:14Z","timestamp":1606187174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15384-6_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642153839","9783642153846"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15384-6_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}