{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:58:40Z","timestamp":1770832720005,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/icccn.2016.7568518","type":"proceedings-article","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T20:53:48Z","timestamp":1473972828000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection"],"prefix":"10.1109","author":[{"given":"Yong","family":"Jin","sequence":"first","affiliation":[]},{"given":"Masahiko","family":"Tomoishi","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Matsuura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","year":"0"},{"key":"ref3","article-title":"2015 Internet Security Threat Report, Volume 20 (ISTR20)","year":"0"},{"key":"ref10","article-title":"Design of A Concealed File System Adapted for Mobile Devices Based on GPS Information","author":"yong","year":"2016","journal-title":"2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637181"},{"key":"ref11","article-title":"Bu-353S4 Cable GPS with USB inrerface (SiRF Star IV)","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2071880.2071887"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2014.6851501"},{"key":"ref8","article-title":"SEE WHAT WE'RE UP TO","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.192"},{"key":"ref2","article-title":"Security Architecture for the Internet Protocol","author":"kent","year":"2005","journal-title":"IETF RFC4301"},{"key":"ref9","article-title":"NMEA 0183 Standard","year":"0"},{"key":"ref1","article-title":"Point-to-Point Tunneling Protocol (PPTP)","author":"hamzeh","year":"1999","journal-title":"IETF RFC2637"}],"event":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","location":"Waikoloa, HI, USA","start":{"date-parts":[[2016,8,1]]},"end":{"date-parts":[[2016,8,4]]}},"container-title":["2016 25th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7566809\/7568456\/07568518.pdf?arnumber=7568518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T11:52:37Z","timestamp":1475668357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7568518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icccn.2016.7568518","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}