{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:51:26Z","timestamp":1725666686671},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/perser.2007.4283905","type":"proceedings-article","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T19:11:18Z","timestamp":1186600278000},"page":"149-152","source":"Crossref","is-referenced-by-count":7,"title":["A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments"],"prefix":"10.1109","author":[{"given":"Pho Duc","family":"Giang","sequence":"first","affiliation":[]},{"given":"Le Xuan","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Riaz Ahmed","family":"Shaikh","sequence":"additional","affiliation":[]},{"given":"Yonil","family":"Zhung","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Young-Koo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"20","article-title":"An Efficient System for Nontransferable Anonymous Credentials with Optional Anonymity Revocation","author":"camenisch","year":"2001","journal-title":"LNCS"},{"key":"ref3","first-page":"199","article-title":"Blind Signatures for Untraceable Payments","author":"chaum","year":"1982","journal-title":"Advances in Cryptology Proceedings of Crypto 82"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45126-6_2","article-title":"A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks","author":"jakobsson","year":"2003","journal-title":"Financial Cryptography"},{"article-title":"Intrusion Tolerant Group-based Trust Management Scheme for Wireless Sensor Networks","year":"0","author":"shaikh","key":"ref8"},{"key":"ref7","article-title":"Using Relationship to Control Disclosure in Awareness Servers","author":"davis","year":"2005","journal-title":"Proceedings of the 2005 Conference on Graphics Interface"},{"key":"ref2","first-page":"26","article-title":"Spki certificate theory","author":"ellison","year":"1999","journal-title":"Internet Request for Comments"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1995.390635"}],"event":{"name":"IEEE International Conference on Pervasive Services","start":{"date-parts":[[2007,7,15]]},"location":"The Marmara Istanbul","end":{"date-parts":[[2007,7,20]]}},"container-title":["IEEE International Conference on Pervasive Services"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4283874\/4283875\/04283905.pdf?arnumber=4283905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T21:50:16Z","timestamp":1497736216000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4283905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/perser.2007.4283905","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}