{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T17:28:49Z","timestamp":1758475729879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314353","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"99-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Pripayd"],"prefix":"10.1145","author":[{"given":"Carmela","family":"Troncoso","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Eleni","family":"Kosta","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aioi. http:\/\/www.ioi-sonpo.co.jp\/.  Aioi. http:\/\/www.ioi-sonpo.co.jp\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Aioi. Telematics insurance system.  Aioi. Telematics insurance system."},{"key":"e_1_3_2_1_3_1","volume-title":"Security engineering","author":"Anderson R.","year":"2001","unstructured":"R. Anderson . Security engineering . Wiley New York , 2001 . R. Anderson. Security engineering. Wiley New York, 2001."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862423"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/3-540-61996-8_38","volume-title":"Information Hiding","author":"Anderson Ross J.","year":"1996","unstructured":"Ross J. Anderson , Serge Vaudenay , Bart Preneel , and Kaisa Nyberg . The Newton channel . In Ross J. Anderson, editor, Information Hiding , volume 1174 of Lecture Notes in Computer Science , pages 151 -\u00bf 156 . Springer , 1996 . Ross J. Anderson, Serge Vaudenay, Bart Preneel, and Kaisa Nyberg. The Newton channel. In Ross J. Anderson, editor, Information Hiding, volume 1174 of Lecture Notes in Computer Science, pages 151-\u00bf156. Springer, 1996."},{"key":"e_1_3_2_1_6_1","unstructured":"Aryeh. http:\/\/www.aryeh.co.il\/.  Aryeh. http:\/\/www.aryeh.co.il\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Sara Assicurazioni. http:\/\/www.saraassicurazioni.it\/.  Sara Assicurazioni. http:\/\/www.saraassicurazioni.it\/."},{"key":"e_1_3_2_1_8_1","unstructured":"American Automobile Association. http:\/\/www.aaa.com\/.  American Automobile Association. http:\/\/www.aaa.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"National Motorist Association. NMA's position on auto insurance. http:\/\/www.motorists.org 1998.  National Motorist Association. NMA's position on auto insurance. http:\/\/www.motorists.org 1998."},{"key":"e_1_3_2_1_10_1","unstructured":"Autograph. https: \/\/secure.avivacanada.com\/autograph\/product.php.  Autograph. https: \/\/secure.avivacanada.com\/autograph\/product.php."},{"key":"e_1_3_2_1_11_1","volume-title":"Mitre","author":"Bell D. E.","year":"1974","unstructured":"D. E. Bell and L. J. La Padula . Secure Computer Systems: Mathematical Foundations and Model . Mitre , 1974 . D. E. Bell and L. J. La Padula. Secure Computer Systems: Mathematical Foundations and Model. Mitre, 1974."},{"key":"e_1_3_2_1_12_1","unstructured":"Toyota Motor Corporation. http:\/\/www.toyota.co.jp\/.  Toyota Motor Corporation. http:\/\/www.toyota.co.jp\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Corona Direct. http:\/\/www.kilometerverzekering.be\/.  Corona Direct. http:\/\/www.kilometerverzekering.be\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Polis Direct. http:\/\/www.kilometerpolis.nl\/.  Polis Direct. http:\/\/www.kilometerpolis.nl\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971619"},{"key":"e_1_3_2_1_16_1","volume-title":"A Guide to Understanding Covert Channel Analysis of Trusted Systems","author":"Gligor Virgil D.","year":"1993","unstructured":"Virgil D. Gligor . A Guide to Understanding Covert Channel Analysis of Trusted Systems . National Computer Security Center , ncsc-tg-030 version-1 edition, 1993 . Virgil D. Gligor. A Guide to Understanding Covert Channel Analysis of Trusted Systems. National Computer Security Center, ncsc-tg-030 version-1 edition, 1993."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Vanessa\n      Gratzer\n     and \n      David\n      Naccache\n    .\n  Alien vs. Quine the vanishing circuit and other tales from the industry's crypt\n  . In Serge Vaudenay editor EUROCRYPT \n  2006 volume \n  4004\n   of \n  Lecture Notes in Computer Science pages \n  48\n  -\u00bf\n  58\n  . \n  Springer 2006.  Vanessa Gratzer and David Naccache. Alien vs. Quine the vanishing circuit and other tales from the industry's crypt. In Serge Vaudenay editor EUROCRYPT 2006 volume 4004 of Lecture Notes in Computer Science pages 48-\u00bf58. Springer 2006.","DOI":"10.1007\/11761679_4"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.586"},{"key":"e_1_3_2_1_19_1","unstructured":"Hollard Insurance. http:\/\/www.payasyoudrive.co.za\/.  Hollard Insurance. http:\/\/www.payasyoudrive.co.za\/."},{"key":"e_1_3_2_1_20_1","unstructured":"iPAID. http:\/\/www.ipaid-insurance.com\/.  iPAID. http:\/\/www.ipaid-insurance.com\/."},{"key":"e_1_3_2_1_21_1","volume-title":"August","author":"Robert John McMillan","year":"1998","unstructured":"McMillan Robert John , Craig Alexander Dean, and Heinen John Patrick. Motor vehicle monitoring system for determining a cost of insurance , August 1998 . McMillan Robert John, Craig Alexander Dean, and Heinen John Patrick. Motor vehicle monitoring system for determining a cost of insurance, August 1998."},{"key":"e_1_3_2_1_22_1","volume-title":"Distance-based vehicle insurance feasibility, costs and benefits. Technical report","author":"Litman Todd","year":"2007","unstructured":"Todd Litman . Distance-based vehicle insurance feasibility, costs and benefits. Technical report , Victoria Transport Policy Institute , 2007 . Todd Litman. Distance-based vehicle insurance feasibility, costs and benefits. Technical report, Victoria Transport Policy Institute, 2007."},{"key":"e_1_3_2_1_23_1","unstructured":"MAPFRE. http:\/\/www.jovenesdesiguales.com\/.  MAPFRE. http:\/\/www.jovenesdesiguales.com\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A. J.","year":"1997","unstructured":"A. J. Menezes . Handbook of Applied Cryptography . CRC Press , 1997 . A. J. Menezes. Handbook of Applied Cryptography. CRC Press, 1997."},{"key":"e_1_3_2_1_25_1","unstructured":"Movitrack. http:\/\/www.movitrack.it\/.  Movitrack. http:\/\/www.movitrack.it\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.502402"},{"key":"e_1_3_2_1_27_1","volume-title":"March","author":"Nakagawa Shigeru","year":"2001","unstructured":"Shigeru Nakagawa , Kenji Mori , Akira Shinada , Katsuhiko Nunokawa , Hiroaki Okajima , and Makoto Sasaki . Vehicle insurance premium calculation system, on-board apparatus, and server apparatus , March 2001 . Shigeru Nakagawa, Kenji Mori, Akira Shinada, Katsuhiko Nunokawa, Hiroaki Okajima, and Makoto Sasaki. Vehicle insurance premium calculation system, on-board apparatus, and server apparatus, March 2001."},{"key":"e_1_3_2_1_28_1","unstructured":"NedBank. http:\/\/www.nedbank.co.za\/.106  NedBank. http:\/\/www.nedbank.co.za\/.106"},{"key":"e_1_3_2_1_29_1","unstructured":"Pay&Go. http:\/\/paygo-system.com\/ShamirWeb\/PublicSite\/default.html.  Pay&Go. http:\/\/paygo-system.com\/ShamirWeb\/PublicSite\/default.html."},{"key":"e_1_3_2_1_30_1","volume-title":"December","author":"Perez Salvador Minguijon","year":"1997","unstructured":"Salvador Minguijon Perez . Individual evaluation system for motorcar risk , December 1997 . Salvador Minguijon Perez. Individual evaluation system for motorcar risk, December 1997."},{"key":"e_1_3_2_1_31_1","unstructured":"Progressive. http:\/\/www.progressive.com\/.  Progressive. http:\/\/www.progressive.com\/."},{"key":"e_1_3_2_1_32_1","unstructured":"TripSensor Progressive Casualty Insurance. https:\/\/tripsense.progressive.com\/.  TripSensor Progressive Casualty Insurance. https:\/\/tripsense.progressive.com\/."},{"key":"e_1_3_2_1_33_1","unstructured":"Swiss Re. http:\/\/www.swissre.com\/.  Swiss Re. http:\/\/www.swissre.com\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"G.J.\n      Simmons\n    .\n  Subliminal communication is easy using the DSA\n  . In T. Helleseth editor EUROCRYPT\n  1993 volume \n  765\n   of \n  Lecture Notes in Computer Science pages 218\u00bf-\n  232\n  . Springer 1993.   G.J. Simmons. Subliminal communication is easy using the DSA. In T. Helleseth editor EUROCRYPT 1993 volume 765 of Lecture Notes in Computer Science pages 218\u00bf-232. Springer 1993.","DOI":"10.1007\/3-540-48285-7_18"},{"key":"e_1_3_2_1_36_1","unstructured":"Skytrax. https:\/\/www.skytrax.co.za\/index.asp.  Skytrax. https:\/\/www.skytrax.co.za\/index.asp."},{"key":"e_1_3_2_1_37_1","unstructured":"STOK. http:\/\/www.stok-nederland.nl\/.  STOK. http:\/\/www.stok-nederland.nl\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Norwich Union. http:\/\/www.norwichunion.com\/pay-as-you-drive\/.  Norwich Union. http:\/\/www.norwichunion.com\/pay-as-you-drive\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Uniqa. http:\/\/www.uniqa.at\/uniqa_at\/.  Uniqa. http:\/\/www.uniqa.at\/uniqa_at\/."},{"key":"e_1_3_2_1_40_1","unstructured":"WGV. http:\/\/www.wgv-online.de\/index.htm.  WGV. http:\/\/www.wgv-online.de\/index.htm."},{"key":"e_1_3_2_1_41_1","unstructured":"DBV Winterthur. http:\/\/entry.dbv-winterthur.de\/.  DBV Winterthur. http:\/\/entry.dbv-winterthur.de\/."},{"key":"e_1_3_2_1_42_1","volume-title":"Pay per mile insurance. Technical report","author":"Zahid Fayyaz","year":"2004","unstructured":"Fayyaz Zahid and Craig Barton . Pay per mile insurance. Technical report , Davenport University , 2004 . Fayyaz Zahid and Craig Barton. Pay per mile insurance. Technical report, Davenport University, 2004."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314353"}},"subtitle":["privacy friendly pay-as-you-drive insurance"],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":42,"alternative-id":["10.1145\/1314333.1314353","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314353","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}