{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:31:44Z","timestamp":1770971504639,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/icl-gnss.2018.8440910","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T22:10:15Z","timestamp":1535062215000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting"],"prefix":"10.1109","author":[{"given":"P.","family":"Richter","sequence":"first","affiliation":[]},{"given":"H.","family":"Leppakoski","sequence":"additional","affiliation":[]},{"given":"E. S.","family":"Lohan","sequence":"additional","affiliation":[]},{"given":"Z.","family":"Yang","sequence":"additional","affiliation":[]},{"given":"K.","family":"Jarvinen","sequence":"additional","affiliation":[]},{"given":"O.","family":"Tkachenko","sequence":"additional","affiliation":[]},{"given":"T.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"32","article-title":"Cramer-rao bound analysis of quantized RSSI based localization in wireless sensor networks","volume":"2","author":"shi","year":"2005","journal-title":"ICPADS"},{"key":"ref11","first-page":"557","article-title":"A sorted RSSI quantization based algorithm for sensor network localization","volume":"1","author":"li","year":"2005","journal-title":"ICPADS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2016.7743606"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/941351.941354"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.882082"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292429"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/s17040717","article-title":"An improved approach for RSSI-based only calibration-free real-time indoor localization on IEEE 802.11 and 802.15.4 wireless networks","volume":"17","author":"passafiume","year":"2017","journal-title":"SENSORS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.07.005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2637663"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IPIN.2014.7275492"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848176"},{"key":"ref27","author":"richter","year":"2018","journal-title":"WLAN (WiFi) RSS database for fingerprinting positioning"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848178"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2441724"},{"key":"ref5","article-title":"Poster: Privacy-preserving indoor localization","author":"ziegeldorf","year":"2014","journal-title":"WISEC"},{"key":"ref8","article-title":"The death and rebirth of privacy-reserving Wifi fingerprint localization with Paillier encryption","author":"yang","year":"2018","journal-title":"INFOCOM"},{"key":"ref7","article-title":"Privacy-preserving Wi-Fi fingerprinting indoor localization","author":"zhang","year":"2016","journal-title":"IWSEC"},{"key":"ref2","article-title":"Location privacy challenges and solutions part 2: Hybrid and non-GNSS localization","author":"lohan","year":"2017","journal-title":"Inside GNSS Magazine"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2009893"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.12.003"},{"key":"ref20","first-page":"220","article-title":"Two halves makes a whole - reducing data transfer in garbled circuits using half gates","volume":"9057","author":"zahur","year":"2015","journal-title":"EUROCRYPT Ser LNCS"},{"key":"ref22","author":"schneider","year":"2012","journal-title":"Engineering Secure Two-Party Computation Protocols Design Optimization and Applications of Efficient Secure Function Evaluation"},{"key":"ref21","first-page":"486","article-title":"Improved garbled circuit: Free XOR gates and applications","volume":"5126","author":"kolesnikov","year":"2008","journal-title":"ICALP'98 Ser LNCS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744808"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3626-0"},{"key":"ref25","first-page":"229","article-title":"Efficient privacy-preserving face recognition","volume":"5984","author":"sadeghi","year":"2009","journal-title":"Proceedings of ICISC Ser LNCS"}],"event":{"name":"2018 8th International Conference on Localization and GNSS (ICL-GNSS)","location":"Guimaraes","start":{"date-parts":[[2018,6,26]]},"end":{"date-parts":[[2018,6,28]]}},"container-title":["2018 8th International Conference on Localization and GNSS (ICL-GNSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8422063\/8440892\/08440910.pdf?arnumber=8440910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T12:23:02Z","timestamp":1643199782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8440910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icl-gnss.2018.8440910","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}