{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:59:10Z","timestamp":1729616350208,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/ausctw.2014.6766443","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:59:02Z","timestamp":1395327542000},"page":"144-149","source":"Crossref","is-referenced-by-count":6,"title":["Timing information in wireless communications and optimal location verification frameworks"],"prefix":"10.1109","author":[{"given":"Shihao","family":"Yan","sequence":"first","affiliation":[]},{"given":"Robert","family":"Malaney","sequence":"additional","affiliation":[]},{"given":"Ido","family":"Nevat","sequence":"additional","affiliation":[]},{"given":"Gareth W.","family":"Peters","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"95","article-title":"Software based measurement of round trip time observables for location in ieee 802.11 networks","author":"martin-escalona","year":"2013","journal-title":"Proc ConTEL"},{"key":"17","first-page":"1","article-title":"Determining times of arrival of transponder signals in a sensor network using gps time synchronization","author":"steffes","year":"2011","journal-title":"Proc INFORMATIK"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33368-2_8"},{"key":"15","article-title":"Signal strength based wireless location verification under spatially correlated shadowing","author":"yan","year":"2013","journal-title":"IEEE ICC"},{"key":"16","first-page":"3","article-title":"Location verification systems in emerging wireless networks","volume":"11","author":"yan","year":"2013","journal-title":"ZTE Communications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503982"},{"key":"14","article-title":"Optimal informationtheoretic wireless location verification","author":"yan","year":"2013","journal-title":"IEEE Trans Veh Technol Accepted As A Paper (With Minor Revisions"},{"key":"11","volume":"27","author":"zekavat","year":"2012","journal-title":"Handbook of Position Location Theory Practice and Advances"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2174465"},{"journal-title":"Measurement Based Shadow Fading Model for Vehicle-to-vehicle Network Simulations","year":"2013","author":"abbas","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05247"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.1933.0009"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.835319"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814469"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2044904"},{"key":"7","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1504\/IJSN.2007.012822","article-title":"Securing wi-fi networks with position verification","volume":"2","author":"malaney","year":"2007","journal-title":"Int J Netw Secur"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.57"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378399"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.261"},{"key":"9","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1109\/TIFS.2008.919121","article-title":"Evaluation of localization attacks on power-modulated challenge-response systems","volume":"3","author":"yu","year":"2008","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70782"}],"event":{"name":"2014 Australian Communications Theory Workshop (AusCTW)","start":{"date-parts":[[2014,2,3]]},"location":"Sydney, Australia","end":{"date-parts":[[2014,2,5]]}},"container-title":["2014 Australian Communications Theory Workshop (AusCTW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6761206\/6766413\/06766443.pdf?arnumber=6766443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:00:28Z","timestamp":1498111228000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6766443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ausctw.2014.6766443","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}