{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:10:13Z","timestamp":1742965813862,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291531"},{"type":"electronic","value":"9783642291548"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29154-8_18","type":"book-chapter","created":{"date-parts":[[2012,4,21]],"date-time":"2012-04-21T03:18:00Z","timestamp":1334978280000},"page":"210-223","source":"Crossref","is-referenced-by-count":18,"title":["LINK: Location Verification through Immediate Neighbors Knowledge"],"prefix":"10.1007","author":[{"given":"Manoop","family":"Talasila","sequence":"first","affiliation":[]},{"given":"Reza","family":"Curtmola","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Kindberg, T., Zhang, L., Shankar, N.: Context authentication using constrained channels. In: Proc. of WMCSA 2002, pp. 14\u201321 (2002)","DOI":"10.1109\/MCSA.2002.1017481"},{"key":"18_CR2","first-page":"23","volume":"1","author":"C. Wullems","year":"2004","unstructured":"Wullems, C., Pozzobon, O., Kubik, K.: Trust your receiver? Enhancing location security. GPS World\u00a01, 23\u201330 (2004)","journal-title":"GPS World"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Rasmussen, K., \u010capkun, S.: Location privacy of distance bounding protocols. In: Proc. of the 15th ACM Conference on Computer and Communications Security (CCS 2008), pp. 149\u2013160 (October 2008)","DOI":"10.1145\/1455770.1455791"},{"issue":"4","key":"18_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TDSC.2006.57","volume":"3","author":"A. Vora","year":"2006","unstructured":"Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Trans. Dependable Secur. Comput.\u00a03(4), 377\u2013385 (2006)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Douceur, J.: The Sybil Attack. In: Proc. of IPTPS 2001, pp. 251\u2013260 (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"3-4","key":"18_CR7","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11235-009-9259-5","volume":"44","author":"X. Chu","year":"2010","unstructured":"Chu, X., Chen, X., Zhao, K., Liu, J.: Reputation and trust management in heterogeneous peer-to-peer networks. Springer Telecommunication Systems\u00a044(3-4), 191\u2013203 (2010)","journal-title":"Springer Telecommunication Systems"},{"key":"18_CR8","unstructured":"Talasila, M., Curtmola, R., Borcea, C.: LINK: Location-verification through immediate neighbors knowledge. Department of Computer Science, NJIT, Tech. Rep. (2010)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Singelee, D., Preneel, B.: Location verification using secure distance bounding protocols. In: Proc. of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), pp. 834\u2013840 (November 2005)","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-642-04444-1_38","volume-title":"Computer Security \u2013 ESORICS 2009","author":"N. Tippenhauer","year":"2009","unstructured":"Tippenhauer, N., \u010capkun, S.: Id-based secure distance bounding and localization. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 621\u2013636. Springer, Heidelberg (2009)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Chiang, J.T., Haas, J., Hu, Y.-C.: Secure and precise location verification using distance bounding and simultaneous multilateration. In: Proc. of the 2nd ACM Conference on Wireless Network Security (WiSec 2009), pp. 181\u2013192 (2009)","DOI":"10.1145\/1514274.1514301"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. of the 2nd ACM Workshop on Wireless Security (Wise 2003), pp. 1\u201310 (2003)","DOI":"10.1145\/941311.941313"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-03356-8_23","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"N. Chandran","year":"2009","unstructured":"Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 391\u2013407. Springer, Heidelberg (2009)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Shmatikov, V., Wang, M.-H.: Secure verification of location claims with simultaneous distance modification. In: Proc. of the 12th Annual Asian Computing Science Conference (Asian 2007), pp. 181\u2013195 (December 2007)","DOI":"10.1007\/978-3-540-76929-3_17"},{"key":"18_CR15","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1145\/1653662.1653692","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security","author":"J. Manweiler","year":"2009","unstructured":"Manweiler, J., Scudellari, R., Cox, L.: SMILE: Encounter-based trust for mobile social services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 246\u2013255. ACM, New York (2009)"},{"key":"18_CR16","first-page":"331","volume-title":"Proc. of MobiSys 2010","author":"A. Kalamandeen","year":"2010","unstructured":"Kalamandeen, A., Scannell, A., de Lara, E., Sheth, A., LaMarca, A.: Ensemble: cooperative proximity-based authentication. In: Proc. of MobiSys 2010, pp. 331\u2013344. ACM, New York (2010)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.-Y.L.: Performance Analysis of the CONFIDANT Protocol. In: Proc. of MobiHoc 2002, pp. 226\u2013236 (2002)","DOI":"10.1145\/513824.513828"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. of the IFIP TC6\/TC11 6th Joint Working Conference on Communications and Multimedia Security, pp. 107\u2013121 (2002)","DOI":"10.1007\/978-0-387-35612-9_9"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29154-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:34:11Z","timestamp":1742963651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29154-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291531","9783642291548"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29154-8_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}