{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:52:28Z","timestamp":1729608748352,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856711","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:16:34Z","timestamp":1487265394000},"page":"273-278","source":"Crossref","is-referenced-by-count":1,"title":["PRS signal in acquiring evidence of Digital Chain of Custody"],"prefix":"10.1109","author":[{"given":"Tomas","family":"Marques-Arpa","sequence":"first","affiliation":[]},{"given":"Jordi","family":"Serra-Ruiz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Handbook of Appl Cryptog","year":"1997","author":"vanstone","key":"ref10"},{"key":"ref11","article-title":"Expanding the potential for GPS evidence acquisition","volume":"3","author":"strawn","year":"2009","journal-title":"Small Scale Digital Evidence Forensic Journal"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.diin.2015.04.005","article-title":"Digital wiretap warrant: improving the security of ETSI lawful interception","author":"mu\u00f1oz","year":"2015","journal-title":"Digital Investigation"},{"key":"ref13","article-title":"Signal characteristics of civil GPS jammers","author":"mitch","year":"2011","journal-title":"Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2011)"},{"key":"ref14","article-title":"Assessing the spoofing threat: development of a portable GPS civilian spoofer","author":"humphreys","year":"2008","journal-title":"Proceedings of the 21st International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2008)"},{"key":"ref15","article-title":"The Galileo satellite system and its security implications","author":"lindstr\u00f6m","year":"2003","journal-title":"Ocassional Papers no 44 European Union Institute for Security Studies"},{"key":"ref16","article-title":"Members of the Galileo Signal Task Force of the European Commission in Brussels, &#x201C;The GALILEO frequency structure and signal design","author":"hein","year":"2002","journal-title":"Proceedings of ION 2002"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"200","DOI":"10.5081\/jgps.3.1.200","article-title":"Secure tracking using trusted GNSS receivers and Galileo authentication services","volume":"3","author":"pozzobon","year":"2005","journal-title":"Journal of Global Positioning Systems"},{"key":"ref18","first-page":"12","article-title":"SAASM and direct P(Y) signal acquisition","volume":"16","author":"callaghan","year":"2003","journal-title":"The Journal of Defense Software Engineering"},{"key":"ref19","article-title":"Jamming and spoofing of GNSS signals-An underestimated risk?!","author":"rugamer","year":"2015","journal-title":"FIG Working Week 2015 From the Wisdom of the Ages to the Challenges of the Modern World Sofia"},{"key":"ref4","first-page":"vii","article-title":"Information technology-Security techniques-Guidelines for the analysis and interpretation of digital evidence","year":"2015","journal-title":"ISO\/IEC 27042 2015 (E)"},{"journal-title":"European Commission Decision C 6776 (2015)","article-title":"Horizon 2020. Work programme 2016-2017","year":"2015","key":"ref3"},{"journal-title":"National Institute of Justice of USA (NIJ) Office of Justice Programs","article-title":"Crimes scene guides","year":"2016","key":"ref6"},{"key":"ref5","first-page":"8","article-title":"An online algorithm for generating fractal hash chains applied to digital chains of custody","author":"bardford","year":"2007","journal-title":"IEEE- ISI (Intelligence and Security Informatics Conference)"},{"key":"ref8","first-page":"435","article-title":"A framework to (im)prove &#x201C;chain of custody&#x201D; in digital investigation process","author":"cosi?","year":"2010","journal-title":"Proceedings of CECIIS-2010 21st Central European Conference on Information and Intelligent Systems Faculty of Organization and Informatics"},{"key":"ref7","article-title":"Deconstructing web pages","author":"tallim","year":"2016","journal-title":"Media Awareness Network"},{"journal-title":"European Commission Decision C 4995 (2014)","article-title":"Horizon 2020. Work programme 2014-2015","year":"2014","key":"ref2"},{"journal-title":"European Commission Decision C 4536 (2012)","article-title":"7th Framework programme. Work programme for 2013","year":"2012","key":"ref1"},{"key":"ref9","first-page":"429","article-title":"Do we have a full control over integrity in digital evidence life cycle","author":"?osi?","year":"2010","journal-title":"Proceedings of the ITI 2010 32nd International Conference on Information Technology Interfaces ITI"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2311"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856711.pdf?arnumber=7856711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:45:02Z","timestamp":1498373102000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856711","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}