{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:29:52Z","timestamp":1777390192408,"version":"3.51.4"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/percomw.2012.6197514","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:30:23Z","timestamp":1337884223000},"page":"381-386","source":"Crossref","is-referenced-by-count":22,"title":["Location privacy via actively secure private proximity testing"],"prefix":"10.1109","author":[{"given":"Janus Dam","family":"Nielsen","sequence":"first","affiliation":[]},{"given":"Jakob Illeborg","family":"Pagter","sequence":"additional","affiliation":[]},{"given":"Michael Bladt","family":"Stausholm","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_3"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"14","first-page":"239","article-title":"Efficient identification and signatures for smart cards","author":"schnorr","year":"1989","journal-title":"Advances in CryptologyCRYPTO '99 Proc"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"12","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/BFb0054851","article-title":"The decision diffie-hellman problem","volume":"1423","author":"boneh","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_6"},{"key":"1","first-page":"162","article-title":"How to generate and exchange secrets (extended abstract)","author":"yao","year":"1986","journal-title":"Foundations of Computer Science"},{"key":"10","first-page":"75","article-title":"Private and flexible proximity detection in mobile social networks","author":"siksnys","year":"2010","journal-title":"Mobile Data Management"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"6","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","article-title":"Secure multiparty computation goes live","volume":"5628","author":"bogetoft","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864364"},{"key":"4","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/11551201_13","article-title":"Control, deception, and communication: Evaluating the deployment of a location-enhanced messaging service","volume":"3660","author":"iachello","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0213-7"},{"key":"8","article-title":"Location privacy via private proximity testing","author":"narayanan","year":"2011","journal-title":"NDSS"}],"event":{"name":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","location":"Lugano, Switzerland","start":{"date-parts":[[2012,3,19]]},"end":{"date-parts":[[2012,3,23]]}},"container-title":["2012 IEEE International Conference on Pervasive Computing and Communications Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6192378\/6197445\/06197514.pdf?arnumber=6197514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:14:37Z","timestamp":1497971677000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6197514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/percomw.2012.6197514","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}