{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:50:06Z","timestamp":1726361406558},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380327"},{"type":"electronic","value":"9783642380334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38033-4_13","type":"book-chapter","created":{"date-parts":[[2013,5,6]],"date-time":"2013-05-06T20:51:00Z","timestamp":1367873460000},"page":"174-188","source":"Crossref","is-referenced-by-count":8,"title":["Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks"],"prefix":"10.1007","author":[{"given":"Divyan Munirathnam","family":"Konidala","sequence":"first","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hoong Chuin","family":"Lau","sequence":"additional","affiliation":[]},{"given":"Stephen E.","family":"Fienberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/BFb0034851","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"M. Abe","year":"1996","unstructured":"Abe, M., Fujisaki, E.: How to date blind signatures. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 244\u2013251. Springer, Heidelberg (1996)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-44598-6_17","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"M. Abe","year":"2000","unstructured":"Abe, M., Okamoto, T.: Provably secure partially blind signatures. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 271\u2013286. Springer, Heidelberg (2000)"},{"key":"13_CR3","unstructured":"AECOM, TEA-AECOM 2011 Theme Index The Global Attractions Attendance Report, Themed Entertainment Association (TEA) (2011)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clone wars: Efficient periodic n-times anonymous authentication. In: CCS 2006, pp. 201\u2013210 (2006)","DOI":"10.1145\/1180405.1180431"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO 1982, pp. 199\u2013203 (1982)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"10","key":"13_CR6","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/0-387-34799-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"I.B. Damg\u00e5rd","year":"1990","unstructured":"Damg\u00e5rd, I.B.: Payment systems and credential mechanisms with provable security against abuse by individuals. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 328\u2013335. Springer, Heidelberg (1990)"},{"key":"13_CR9","unstructured":"Disney\u2019s FASTPASS Service, \n                    \n                      http:\/\/disneyworld.disney.go.com\/guest-services\/fast-pass\/"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Fahl, S., Harbach, M., Muders, T., Smith, M., Baumgartner, L., Freisleben, B.: Why Eve and Mallory love Android: An analysis of Android SSL (In)security. In: CCS 2012, pp. 50\u201361 (2012)","DOI":"10.1145\/2382196.2382205"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web mixes: A system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"issue":"11","key":"13_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2011.6069707","volume":"49","author":"R. Ganti","year":"2011","unstructured":"Ganti, R., Ye, F., Lei, H.: Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine\u00a049(11), 32\u201339 (2011)","journal-title":"IEEE Communications Magazine"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V.: The most dangerous code in the world: Validating SSL certificates in non-browser software. In: CCS 2012, pp. 38\u201349 (2012)","DOI":"10.1145\/2382196.2382204"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Gross, D., Shortle, J.F., Thompson, J.M., Harris, C.M.: Fundamentals of Queueing Theory. Wiley (2008)","DOI":"10.1002\/9781118625651"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Ren, M.: Location cheating: A security challenge to location-based social network services. In: ICDCS 2011, pp. 740\u2013749 (2011)","DOI":"10.1109\/ICDCS.2011.42"},{"key":"13_CR16","unstructured":"Internet Engineering Task Force (IETF), Network Working Group, HTTP Over TLS, RFC2818 (2000), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc2818"},{"key":"13_CR17","unstructured":"Menezes, A.J., vaz Oorschot, P.C., Vanstone, S.A.: Digital Signatures. In: Handbook of Applied Cryptography, ch.11. CRC Press (1997)"},{"key":"13_CR18","unstructured":"Merlin Entertainments iTunes App., LEGOLAND California (2012), \n                    \n                      https:\/\/itunes.apple.com\/us\/app\/legoland-california-official\/id452395530"},{"key":"13_CR19","unstructured":"Orbot: Tor on Android, The Tor Project (2012), \n                    \n                      https:\/\/guardianproject.info\/apps\/orbot\/"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Sherchan, W., Jayaraman, P.P., Krishnaswamy, S., Zaslavsky, A.B., Loke, S.W., Sinha, A.: Using on-the-move mining for Mobile crowdsensing. In: MDM 2012, pp. 115\u2013124 (2012)","DOI":"10.1109\/MDM.2012.58"},{"key":"13_CR21","unstructured":"Tor, Anonymity Online, \n                    \n                      https:\/\/www.torproject.org\/"},{"key":"13_CR22","unstructured":"Universal Express Passes, Universal Orlando Resort, \n                    \n                      http:\/\/www.universalorlando.com\/Theme-Park-Tickets\/Universal-Express\/Express-Passes.aspx"},{"key":"13_CR23","unstructured":"Walt Disney iTunes App., Disney Mobile Magic (2012), \n                    \n                      https:\/\/itunes.apple.com\/us\/app\/disney-mobile-magic\/id500000336"},{"key":"13_CR24","unstructured":"Dai, W.: Speed Comparison of Popular Crypto Algorithms, \n                    \n                      http:\/\/www.cryptopp.com\/benchmarks.html"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38033-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T18:08:56Z","timestamp":1557684536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38033-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380327","9783642380334"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38033-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}