{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T11:59:12Z","timestamp":1775303952458,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wcnc.2005.1424677","type":"proceedings-article","created":{"date-parts":[[2005,4,25]],"date-time":"2005-04-25T18:49:51Z","timestamp":1114454991000},"page":"1187-1192","source":"Crossref","is-referenced-by-count":101,"title":["Enhancing wireless location privacy using silent period"],"prefix":"10.1109","volume":"2","author":[{"family":"Leping Huang","sequence":"first","affiliation":[]},{"given":"K.","family":"Matsuura","sequence":"additional","affiliation":[]},{"given":"H.","family":"Yamane","sequence":"additional","affiliation":[]},{"given":"K.","family":"Sezaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"IETF Host Identity Protocol Wg"},{"key":"17","author":"dupont","year":"2004","journal-title":"RFC 3041 Considered Harmful"},{"key":"18","article-title":"Statistically unique and cryptographically verifiable (sucv) identifiers and addresses","author":"montenegro","year":"2002","journal-title":"Proc of Network and Distributed System Security Symposium 2002 (NDSS2002)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2004.1414572"},{"key":"16","article-title":"Privacy extensions for stateless address autoconfiguration in ipv6","volume":"3041","author":"narten","year":"2001","journal-title":"RFC"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"14","year":"0","journal-title":"48-bit Extended Unique Identifier"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"12","year":"0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"20","year":"0"},{"key":"2","year":"0","journal-title":"Hitachi's Air Location"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/RAWCON.2004.1389140"},{"key":"10","article-title":"Towards an analysis of onion routing security","author":"syverson","year":"2000","journal-title":"Proc of Workshop on Design Issues in Anonymity and Unobservability"},{"key":"7","article-title":"Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis","year":"2003","journal-title":"Proc of 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"5","volume":"4","year":"2003","journal-title":"Bluetooth 1 2 Draft"},{"key":"4","article-title":"Enhancements to rss based indoor tracking systems using kalman filter","author":"guvenc","year":"2003","journal-title":"Proc Int Conf Signal Processing"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"8","article-title":"A methodological assessment of location privacy risks in wireless hotspot networks","volume":"2802","year":"2003","journal-title":"Proc of 1st Intl Conf on Security in Pervasive Computing (SPC 2003)"}],"event":{"name":"IEEE Wireless Communications and Networking Conference, 2005","location":"New Orleans, LA, USA"},"container-title":["IEEE Wireless Communications and Networking Conference, 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9744\/30729\/01424677.pdf?arnumber=1424677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T18:53:00Z","timestamp":1489517580000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1424677\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2005.1424677","relation":{},"subject":[]}}