{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:22:58Z","timestamp":1730233378018,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/iccchina.2015.7448631","type":"proceedings-article","created":{"date-parts":[[2016,4,8]],"date-time":"2016-04-08T06:36:58Z","timestamp":1460097418000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices"],"prefix":"10.1109","author":[{"given":"Bett","family":"Ben Chirchir","sequence":"first","affiliation":[]},{"given":"Xiaokuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mengyuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiyang","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Na","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"2404","article-title":"Spread: enhancing data confidentiality in mobile ad hoc networks","volume":"4","author":"lou","year":"2004","journal-title":"INFOCOM 2004 Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies"},{"key":"ref11","first-page":"50","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc AFIPs 1979 National Computer Conference"},{"key":"ref12","first-page":"381","article-title":"Location privacy via private proximity testing","author":"narayanan","year":"2011","journal-title":"Proc of NDSS 2011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934991"},{"key":"ref14","article-title":"Robust location tag generation from noisy location data for security applications","author":"di qiu","year":"0","journal-title":"Proceedings of the 2009 International Technical Meeting of The Institute of Navigation 2009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_21"},{"key":"ref16","first-page":"1018","article-title":"Signal authentication - a secure civil gnss for today","volume":"327","author":"sherman lo","year":"2009","journal-title":"Inside GNSS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref3","article-title":"Systematic detection of capability leaks in stock android smartphones","author":"grace","year":"2012","journal-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security 2012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.06.012"},{"key":"ref5","article-title":"Visual cryptography","author":"shamir","year":"1995","journal-title":"Advances in Cryptology - Eurocrypt'94 Proceeding"},{"key":"ref8","article-title":"A hierarchical threshold secret image sharing","author":"cheng guo","year":"0","journal-title":"Pattern Recognition Letters 2011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2012.6334888"},{"article-title":"Smartphone os market share","year":"2014","author":"corporation","key":"ref2"},{"key":"ref1","first-page":"273","article-title":"Hundreds of intimate celebrity pictures leaked online following alleged icloud breach","volume":"20","author":"newsweek","year":"2014"},{"key":"ref9","article-title":"A user-friendly secret image sharing scheme with reversible steganography based on cellular automata","author":"xiaotian wua","year":"0","journal-title":"Journal of Systems and Software 2012"}],"event":{"name":"2015 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2015,11,2]]},"location":"Shenzhen, China","end":{"date-parts":[[2015,11,4]]}},"container-title":["2015 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7442693\/7448573\/07448631.pdf?arnumber=7448631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T05:46:19Z","timestamp":1489124779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7448631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2015.7448631","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}