{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:55:53Z","timestamp":1725890153145},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_3","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"29-42","source":"Crossref","is-referenced-by-count":2,"title":["Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems"],"prefix":"10.1007","author":[{"given":"Xihui","family":"Chen","sequence":"first","affiliation":[]},{"given":"David","family":"Fonkwe","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Troncoso, C., Danezis, G., Kosta, E., Preneel, B.: PriPAYD: privacy friendly pay-as-you-drive insurance. In: Proc. ACM Workshop on Privacy in the Electronic Society (WPES), pp. 99\u2013107. ACM (2007)","DOI":"10.1145\/1314333.1314353"},{"issue":"12","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1414","DOI":"10.1016\/j.comcom.2010.02.032","volume":"33","author":"Z. Ma","year":"2010","unstructured":"Ma, Z., Kargl, F., Weber, M.: Measuring long-term location privacy in vehicular communication systems. Computer Communications\u00a033(12), 1414\u20131427 (2010)","journal-title":"Computer Communications"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Giannotti, F., Nanni, M., Pinelli, F., Pedreschi, D.: Trajectory pattern mining. In: Proc. 13th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 330\u2013339. ACM (2007)","DOI":"10.1145\/1281192.1281230"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-01465-9_10","volume-title":"Formal Aspects in Security and Trust","author":"W. Jonge de","year":"2009","unstructured":"de Jonge, W., Jacobs, B.: Privacy-Friendly Electronic Traffic Pricing via Commits. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 143\u2013161. Springer, Heidelberg (2009)"},{"key":"3_CR5","unstructured":"Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: Protecting privacy in location-based vehicular services. In: Proc. 18th USENIX Security Symposium, pp. 335\u2013350. USENIX Association (2009)"},{"key":"3_CR6","unstructured":"Balasch, J., Rial, A., Troncoso, C., Geuens, C.: PrETP: Privacy-preserving electronic toll pricing. In: Proc. 19th USENIX Security Symposium, pp. 63\u201378. USENIX Association (2010)"},{"key":"3_CR7","unstructured":"Chen, X., Lenzini, G., Mauw, S., Pang, J.: A group signature based electronic toll pricing system. In: Proc. 7th Conference on Availability, Reliability and Security (ARES). IEEE CS (to appear, 2012)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-29804-2_7","volume-title":"Public Key Infrastructures, Services and Applications","author":"F. Garcia","year":"2012","unstructured":"Garcia, F., Verheul, E., Jacobs, B.: Cell-Based Roadpricing. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.) EuroPKI 2011. LNCS, vol.\u00a07163, pp. 106\u2013122. Springer, Heidelberg (2012)"},{"key":"3_CR9","unstructured":"Meiklejohn, S., Mowery, K., Checkoway, S., Shacham, H.: The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion. In: Proc. 20th USENIX Security Symposium. USENIX Association (2011)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proc. 29th IEEE Symposium on Security and Privacy (S&P), pp. 111\u2013125. IEEE CS (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proc. 30th IEEE Symposium on Security and Privacy (S&P), pp. 173\u2013187. IEEE CS (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: Proc. 31st IEEE Symposium on Security and Privacy (S&P), pp. 223\u2013238. IEEE CS (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-540-32004-3_19","volume-title":"Security in Pervasive Computing","author":"M. Gruteser","year":"2005","unstructured":"Gruteser, M., Hoh, B.: On the Anonymity of Periodic Location Samples. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol.\u00a03450, pp. 179\u2013192. Springer, Heidelberg (2005)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proc. 14th ACM Conference on Computer and Communications Security (CCS), pp. 161\u2013171. ACM (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proc. 32nd IEEE Symposium on Security and Privacy (S&P), pp. 247\u2013262. IEEE CS (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Trasarti, R., Pinelli, F., Nanni, M., Giannotti, F.: Mining mobility user profiles for car pooling. In: Proc. 17th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), pp. 1190\u20131198. ACM (2011)","DOI":"10.1145\/2020408.2020591"},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1921591.1921596","volume":"5","author":"Y. Zheng","year":"2011","unstructured":"Zheng, Y., Zhang, L., Ma, Z., Xie, X., Ma, W.: Recommending friends and locations based on individual location history. ACM Transactions on the Web\u00a05(1), 5 (2011)","journal-title":"ACM Transactions on the Web"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Chen, X., Pang, J.: Measuring query privacy in location-based services. In: Proc. 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 49\u201360. ACM (2012)","DOI":"10.1145\/2133601.2133608"},{"issue":"1","key":"3_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology\u00a01(1), 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"issue":"4","key":"3_CR20","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/BF03037637","volume":"23","author":"M.J. P\u00e9rez-Jim\u00e9nez","year":"2005","unstructured":"P\u00e9rez-Jim\u00e9nez, M.J., Riscos-N\u00fa\u00f1ez, A.: Solving the subset-sum problem by P systems with active membranes. New Generation Computing\u00a023(4), 339\u2013356 (2005)","journal-title":"New Generation Computing"},{"key":"3_CR21","unstructured":"Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman & Co. (1990)"},{"issue":"2","key":"3_CR22","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s11047-007-9059-3","volume":"8","author":"M. Oltean","year":"2009","unstructured":"Oltean, M., Muntean, O.: Solving the subset-sum problem with a light-based device. Natural Computing\u00a08(2), 321\u2013331 (2009)","journal-title":"Natural Computing"},{"issue":"1","key":"3_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/jagm.1999.1034","volume":"33","author":"D. Pisinger","year":"1999","unstructured":"Pisinger, D.: Linear time algorithms for knapsack problems with bounded weights. Journal of Algorithms\u00a033(1), 1\u201314 (1999)","journal-title":"Journal of Algorithms"},{"key":"3_CR24","unstructured":"Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: Sumo - simulation of urban mobility: An overview. In: Proc. 3rd Conference on Advances in System Simulation (SIMUL), pp. 63\u201368 (2011)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Xiao, X., Zheng, Y., Luo, Q., Xie, X.: Finding similar users using category-based location history. In: Proc. 18th ACM SIGSPATIAL Symposium on Advances in Geographic Information Systems (GIS), pp. 442\u2013445. ACM (2010)","DOI":"10.1145\/1869790.1869857"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., Huang, Y.: T-drive: Driving directions based on taxi trajectories. In: Proc. 18th ACM SIGSPATIAL Symposium on Advances in Geographic Information Systems (GIS), pp. 99\u2013108. ACM (2010)","DOI":"10.1145\/1869790.1869807"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T11:58:58Z","timestamp":1557489538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}