{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:08:48Z","timestamp":1729638528552,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/mobhoc.2009.5336983","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T18:45:43Z","timestamp":1259088343000},"page":"322-331","source":"Crossref","is-referenced-by-count":11,"title":["Measuring location privacy in V2X communication systems with accumulated information"],"prefix":"10.1109","author":[{"given":"Zhendong","family":"Ma","sequence":"first","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Weber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456421"},{"key":"17","first-page":"179","article-title":"On the anonymity of periodic location samples","volume":"3450","author":"gruteser","year":"2005","journal-title":"Security in Pervasive Computing 2005 Boppard Germany"},{"key":"18","article-title":"Preserving privacy in GPS traces via density-aware path cloaking","author":"hoh","year":"2007","journal-title":"ACM Conference on Computer and Communications Security (CCS)"},{"key":"15","article-title":"On the effectiveness of changing pseudonyms to provide location privacy in VANETs","author":"buttyan","year":"2007","journal-title":"ESAS 2007"},{"key":"16","article-title":"Mix-zones for location privacy in vehicular networks","author":"freudiger","year":"2007","journal-title":"WiN-ITS"},{"key":"13","article-title":"Towards measuring anonymity","author":"diaz","year":"2002","journal-title":"Workshop on Privacy Enhancing Technologies"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"11","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-540-40956-4_3","article-title":"Modelling unlinkability","author":"steinbrecher","year":"2003","journal-title":"Workshop on Privacy Enhancing Technologies"},{"key":"12","article-title":"Towards an information theoretic metric for anonymity","author":"serjantov","year":"2002","journal-title":"Workshop on Privacy Enhancing Technologies"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68125-0_42"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071007"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"2","article-title":"privacy issues in vehicular ad hoc networks","author":"do?tzer","year":"2005","journal-title":"Workshop on Privacy Enhancing Technologies"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"article-title":"Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology","year":"0","author":"pfitzmann","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.455"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2009.4850318"},{"key":"4","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPRV.2006.69","article-title":"Enhancing security and privacy in traffic-monitoring systems","volume":"5","author":"hoh","year":"2006","journal-title":"IEEE Pervasive Computing"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5757-9_2"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"}],"event":{"name":"2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS)","start":{"date-parts":[[2009,10,12]]},"location":"Macau, China","end":{"date-parts":[[2009,10,15]]}},"container-title":["2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5312767\/5336910\/05336983.pdf?arnumber=5336983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T02:04:20Z","timestamp":1497837860000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5336983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/mobhoc.2009.5336983","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}