{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:12:28Z","timestamp":1761581548277,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T00:00:00Z","timestamp":1491350400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Key Program of the Natural Science Foundation of Zhejiang pvovince, China","award":["LZ17F020002"],"award-info":[{"award-number":["LZ17F020002"]}]},{"name":"Zhejiang Province Science and Technology Innovation Team","award":["2013TD03"],"award-info":[{"award-number":["2013TD03"]}]},{"name":"the Research Projects of Zhejiang Qianjiang Talents Project","award":["2013R10071"],"award-info":[{"award-number":["2013R10071"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s00500-017-2583-x","type":"journal-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T15:32:15Z","timestamp":1491406335000},"page":"3383-3393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A novel location-based encryption model using fuzzy vault scheme"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2049-8961","authenticated-orcid":false,"given":"Lin","family":"You","sequence":"first","affiliation":[]},{"given":"Yulei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Zhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,5]]},"reference":[{"key":"2583_CR1","doi-asserted-by":"crossref","unstructured":"Abolghasemi MS, Sefidab MM, Atani RE (2013) Using location based encryption to improve the security of data access in cloud computing. In: Proceedings of international conference on advances in computing, communications and informatics (ICACCI). Mysore, pp 261\u2013265","DOI":"10.1109\/ICACCI.2013.6637181"},{"key":"2583_CR2","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1016\/j.comcom.2007.04.016","volume":"30","author":"A Al-Fuqaha","year":"2007","unstructured":"Al-Fuqaha A, Al-Ibrahim O (2007) Geo-encryption protocol for mobile networks. Comput Commun 30:2510\u20132517","journal-title":"Comput Commun"},{"key":"2583_CR3","doi-asserted-by":"crossref","unstructured":"Andalib AS, Abdulla-Al-Shami M (2013) A novel key generation scheme for biometric cryptosystems using fingerprint minutiae. In: Proceedings of 2013 international conference on informatics, electronics and vision (ICIEV). Bangladesh, pp 1\u20136","DOI":"10.1109\/ICIEV.2013.6572670"},{"key":"2583_CR4","doi-asserted-by":"crossref","unstructured":"Askarov A, Sabelfeld A (2007) Gradual release: unifying declassification, encryption and key release policies. In: Proceedings of IEEE symposium on security and privacy (SP\u201907). California, pp 207\u2013221","DOI":"10.1109\/SP.2007.22"},{"key":"2583_CR5","unstructured":"Baidu Inc. (2015). Baidu Map Api. http:\/\/developer.baidu.com\/map\/"},{"key":"2583_CR6","doi-asserted-by":"crossref","unstructured":"Bui FM, Hatzinakos D (2008) Secure methods for fuzzy key binding in biometric authentication applications. In: Proceedings of IEEE 42nd asilomar conference on signals, systems and computers. California, pp 1363\u20131367","DOI":"10.1109\/ACSSC.2008.5074642"},{"key":"2583_CR7","unstructured":"Gartner Inc. Forecast:\u00a0 PCs, ultramobiles, and mobile phones, worldwide. http:\/\/www.gartner.com\/document\/2780117.2011-2018 , 2Q14 Update 2015"},{"key":"2583_CR8","unstructured":"Google Inc. Nexus 5 - Google. http:\/\/www.google.com\/nexus\/5\/ . 2015"},{"issue":"2","key":"2583_CR9","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237\u2013257","journal-title":"Des Codes Cryptogr"},{"key":"2583_CR10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1325555.1325568","volume":"51","author":"IA Junglas","year":"2008","unstructured":"Junglas IA, Watson RT (2008) Location-based services. Commun ACM 51:65\u201369","journal-title":"Commun ACM"},{"key":"2583_CR11","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1049\/iet-ifs.2011.0347","volume":"6","author":"Y Kao","year":"2012","unstructured":"Kao Y, Zhang X, Studer A, Perrig A (2012) Mobile encryption for laptop data protection (MELP). IET Inf Secur 6:291\u2013298","journal-title":"IET Inf Secur"},{"key":"2583_CR12","doi-asserted-by":"crossref","unstructured":"Karimi R, Kalantari M (2011) Enhancing security and confidentiality on mobile devices by location-based data encryption. In: Proceedings of 17th IEEE international conference on networks (ICON). Singapore, pp 241\u2013245","DOI":"10.1109\/ICON.2011.6168482"},{"key":"2583_CR13","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3923\/itj.2008.63.69","volume":"7","author":"H Liao","year":"2008","unstructured":"Liao H, Chao Y (2008) A new data encryption algorithm based on the location of mobile users. Inf Technol J 7:63\u201369","journal-title":"Inf Technol J"},{"key":"2583_CR14","unstructured":"Liu Z, Groszschaedl J, Hu Z, Jarvinen K, Wang H, Verbauwhede I (2016a) Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things. IEEE Trans Comput 14(8):1\u201314"},{"key":"2583_CR15","doi-asserted-by":"publisher","unstructured":"Liu Z, Huang X, Hu Z, Muhammad KK, Seo H, Zhou L (2016b) On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans Dependable Secur Comput. doi: 10.1109\/TDSC.2016.2577022","DOI":"10.1109\/TDSC.2016.2577022"},{"key":"2583_CR16","doi-asserted-by":"crossref","unstructured":"Nguyen TH, Wang Y, Nguyen TN, Li R (2013) A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: Proceedings of IEEE international conference on signal processing, communications and computing (ICSPCC). Kunming, pp 1\u20136","DOI":"10.1109\/ICSPCC.2013.6664061"},{"key":"2583_CR17","unstructured":"Scott L, Denning DE (2003) Location based encryption and its role in digital cinema distribution. In: Proceedings of the 16th international technical meeting of the satellite division of the institute of navigation (ION GPS\/GNSS). Portland, pp 288\u2013297"},{"key":"2583_CR18","doi-asserted-by":"crossref","DOI":"10.1201\/9781420057133","volume-title":"Cryptography: theory and practice","author":"DR Stinson","year":"2005","unstructured":"Stinson DR (2005) Cryptography: theory and practice, 3rd edn. Chapman and Hall\/CRC Press, Florida","edition":"3"},{"key":"2583_CR19","doi-asserted-by":"crossref","unstructured":"Studer A , Perrig A (2010) Mobile user location-specific encryption (MULE): using your office as your password. In: Proceedings of the third ACM conference on wireless network security. New Jersey, pp 151\u2013162","DOI":"10.1145\/1741866.1741892"},{"key":"2583_CR20","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/11527923_32","volume":"3546","author":"U Uludag","year":"2005","unstructured":"Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. Lect Notes Comput Sci 3546:310\u2013319","journal-title":"Lect Notes Comput Sci"},{"key":"2583_CR21","unstructured":"Wu Z, Wu J, Wu Y, Yang M, Zhao C, Li M (2013) A mobile data protection method based on location information. China Patent No. 2013105479836"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2583-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2583-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2583-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T06:53:25Z","timestamp":1658904805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2583-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,5]]},"references-count":21,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["2583"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2583-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,4,5]]}}}