{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:45:39Z","timestamp":1743115539915,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642258664"},{"type":"electronic","value":"9783642258671"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25867-1_12","type":"book-chapter","created":{"date-parts":[[2012,1,9]],"date-time":"2012-01-09T22:04:26Z","timestamp":1326146666000},"page":"132-141","source":"Crossref","is-referenced-by-count":3,"title":["Selective Location Blinding Using Hash Chains"],"prefix":"10.1007","author":[{"given":"Gabriele","family":"Lenzini","sequence":"first","affiliation":[]},{"given":"Sjouke","family":"Mauw","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Balasch, J., Rial, A., Troncoso, C., Geuens, C.: PrETP: Privacy-preserving electronic toll pricing. In: Proc. USENIX Security Symposium, pp. 63\u201378. USENIX (2010)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Privacy Enhancing Technologies","author":"R. Cheng","year":"2006","unstructured":"Cheng, R., Zhang, Y., Hwang, J., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 393\u2013412. Springer, Heidelberg (2006)"},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"C.-Y. Chow","year":"2009","unstructured":"Chow, C.-Y., Mokbel, M.F., Aref, W.G.: Casper\u2009\u22c6\u2009: Query processing for location services without compromising privacy. ACM Transactions on Database Systems\u00a034(4), 1\u201348 (2009)","journal-title":"ACM Transactions on Database Systems"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 324\u2013337. ACM Press (2009)","DOI":"10.1145\/1653662.1653702"},{"key":"12_CR5","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-04434-2_14","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"M. Graham","year":"2009","unstructured":"Graham, M., Gray, D.: Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol.\u00a017, pp. 160\u2013171. Springer, Heidelberg (2009)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. 1st Conference on Mobile Systems, Applications, and Services. USENIX (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"12_CR7","unstructured":"Harpes, C., Jager, B., Gent, B.: Secure localisation with location assurance provider. In: Proc. European Navigation Conference - Global Navigation Satellite Systems (2009)"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1115\/1.3662552","volume":"82","author":"R.E. Kalman","year":"1960","unstructured":"Kalman, R.E.: A new approach to linear filtering and prediction problems. Journal of Basic Engineering\u00a082(1), 35\u201345 (1960)","journal-title":"Journal of Basic Engineering"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/11767831_4","volume-title":"Privacy Enhancing Technologies","author":"G.M. K\u00f8ien","year":"2006","unstructured":"K\u00f8ien, G.M., Oleshchuk, V.A.: Location Privacy for Cellular Systems; Analysis and Solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 40\u201358. Springer, Heidelberg (2006)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proc. 5th ACM Workshop on Privacy in the Electronic Society, pp. 19\u201328. ACM Press (2006)","DOI":"10.1145\/1179601.1179605"},{"key":"12_CR11","unstructured":"Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: Protecting privacy in location-based vehicular services. In: Proc. USENIX Security Symposium, pp. 335\u2013350. USENIX (2009)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proc. 10th Workshop on Mobile Computing Systems and Applications. ACM Press (2009)","DOI":"10.1145\/1514411.1514414"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. ACM Workshop on Wireless Security, pp. 1\u201310. ACM Press (2003)","DOI":"10.1145\/941312.941313"},{"key":"12_CR14","first-page":"19","volume":"25","author":"J.S. Warner","year":"2002","unstructured":"Warner, J.S., Johnston, R.G.: A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration\u00a025, 19\u201328 (2002)","journal-title":"Journal of Security Administration"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Winterbottom, J., Thomson, M., Tschofenig, H.: GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations. Tech. Rep. RFC 5491, IETF Network Working Group (March 2009)","DOI":"10.17487\/rfc5491"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Zhong, G., Hengartner, U.: Toward a distributed k-anonymity protocol for location privacy. In: Proc. 7th ACM Workshop on Privacy in the Electronic Society, pp. 33\u201338. ACM Press (2008)","DOI":"10.1145\/1456403.1456410"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XIX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25867-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T07:35:10Z","timestamp":1556091310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25867-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642258664","9783642258671"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25867-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}