{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:34:30Z","timestamp":1740173670388,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/tcss.2019.2960534","type":"journal-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T21:13:52Z","timestamp":1579814032000},"page":"293-307","source":"Crossref","is-referenced-by-count":18,"title":["PASPORT: A Secure and Private Location Proof Generation and Verification Framework"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6959-0975","authenticated-orcid":false,"given":"Mohammad Reza","family":"Nosouhi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2127-1438","authenticated-orcid":false,"given":"Keshav","family":"Sood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6933-0145","authenticated-orcid":false,"given":"Marthie","family":"Grobler","sequence":"additional","affiliation":[]},{"given":"Jingwen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"250","article-title":"An efficient distance bounding RFID authentication protocol: Balancing false&#x2013;acceptance rate and memory requirement","volume":"5735","author":"avoine","year":"2009","journal-title":"Proc Inf Secur"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/SP.2012.17"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3052973.3053000"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1998412.1998437"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/0-387-25660-1_15"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/SRDS.2014.37"},{"key":"ref37","first-page":"344","article-title":"Distance&#x2013;bounding protocols","author":"brands","year":"1993","journal-title":"Proc EUROCRYPT"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.3233\/JCS-140518"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/MSP.2015.2"},{"key":"ref34","article-title":"The Bussard&#x2013;Bagga and other distance&#x2013;bounding protocols under attacks","author":"bay","year":"2012","journal-title":"Proc Int Conf Inf Secur Cryptol Inscrypt"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29154-8_18","article-title":"Link: Location verification through immediate neighbors knowledge","author":"talasila","year":"2012","journal-title":"Mobile and Ubiquitous Systems Computing Networking and Services"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2414456.2414475"},{"key":"ref29","first-page":"1","article-title":"SPARSE: Privacy-aware and collusion resistant location proof generation and verification","author":"nosouhi","year":"2018","journal-title":"Proc IEEE Globecom"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/COMST.2015.2448632"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JIOT.2018.2820039"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICDCS.2014.71"},{"year":"2003","author":"waters","article-title":"Secure, private proofs of location","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/LCN.2016.126"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/1869790.1869797"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/1514411.1514414"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TMC.2011.237"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TNET.2016.2515119"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/TCSS.2018.2856910"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3264628","article-title":"Security of distance&#x2013;bounding: A survey","volume":"51","author":"avoine","year":"2019","journal-title":"ACM Comput Surv"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-319-71470-7_14"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2187836.2187863"},{"key":"ref40","first-page":"47","article-title":"A formal approach to distance bounding RFID protocols","author":"durholz","year":"2011","journal-title":"Proc 14th Inf Security Conf (ISC)"},{"year":"2019","journal-title":"Nike+ Badges and Trophies","key":"ref12"},{"year":"2019","journal-title":"Higi Know Your Numbers Own Your Health","key":"ref13"},{"year":"2019","journal-title":"Oscar Health Using Misfit Wearables To Reward Fit Customers","key":"ref14"},{"year":"2019","journal-title":"Health Insurer&#x2019;s App Helps Users Track Themselves","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TCCN.2017.2702163"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CNS.2014.6997487"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/GreenCom-CPSCom.2010.148"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CCNC.2016.7444868"},{"year":"2019","journal-title":"Global Location&#x2013;Based Services Market (2018&#x2013;2023)","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s11277-017-4284-2"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JIOT.2015.2481926"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TDSC.2015.2472529"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/INFCOM.2013.6567084"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TMC.2015.2483498"},{"key":"ref49","article-title":"Modelling and analysis of a hierarchy of distance bounding attacks","author":"chothia","year":"2018","journal-title":"Proc 27th USENIX Security Symp (USENIX Security)"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2535771.2535786"},{"key":"ref46","first-page":"207","article-title":"Private and secure public&#x2013;key distance bounding: Application to NFC payment","author":"vaudenay","year":"2015","journal-title":"Proc Financial Cryptogr"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/2590296.2590331"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/TCSS.2019.2907563"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/SP.2018.00001"},{"key":"ref42","article-title":"Practical & provably secure distance&#x2013;bounding","author":"boureanu","year":"2013","journal-title":"Proc 16th Inf Secur Conf (ISC)"},{"key":"ref41","article-title":"The Swiss-Knife RFID distance bounding protocol","author":"kim","year":"2008","journal-title":"Proc Int Conf Inf Secur Cryptol (ICISC)"},{"key":"ref44","first-page":"98","article-title":"The Swiss&#x2013;Knife RFID distance bounding protocol","author":"kim","year":"2008","journal-title":"Proc Inf Secur Cryptol"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1007\/978-3-642-38980-1_26","article-title":"Terrorism in distance bounding: Modeling terrorist&#x2013;fraud resistance","author":"fischlin","year":"2013","journal-title":"Proc 6th Int Conf Appl Cryptogr Netw Secur (ACNS)"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/9055454\/08967030.pdf?arnumber=8967030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:30:25Z","timestamp":1651080625000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8967030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":51,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2019.2960534","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}