{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:33:28Z","timestamp":1759091608561,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["FA8750-12-2-0254"],"award-info":[{"award-number":["FA8750-12-2-0254"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["FA8750-12-2-0254"],"award-info":[{"award-number":["FA8750-12-2-0254"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590339","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"87-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["OTIT"],"prefix":"10.1145","author":[{"given":"Rasib","family":"Khan","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Shams","family":"Zawoad","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Md Munirul","family":"Haque","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Ragib","family":"Hasan","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555838"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Baric N.","year":"1997","unstructured":"N. Baric and B. Pfitzmann . Collision-free accumulators and fail-stop signature schemes without trees . In W. Fumy, editor, Advances in Cryptology - EUROCRYPT 1997 , volume 1233 of Lecture Notes in Computer Science , pages 480 -- 494 . Springer Berlin Heidelberg , 1997. N. Baric and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT 1997, volume 1233 of Lecture Notes in Computer Science, pages 480--494. Springer Berlin Heidelberg, 1997."},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","first-page":"274","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Benaloh J.","year":"1993","unstructured":"J. Benaloh and M. Mare . One-way accumulators: A decentralized alternative to digital signatures . In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT 1993 , volume 765 of Lecture Notes in Computer Science , pages 274 -- 285 . Springer Berlin Heidelberg , 1994. J. Benaloh and M. Mare. One-way accumulators: A decentralized alternative to digital signatures. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT 1993, volume 765 of Lecture Notes in Computer Science, pages 274--285. Springer Berlin Heidelberg, 1994."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-005-0156-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-44503-X_20","volume-title":"Database Theory -- ICDT","author":"Buneman P.","year":"2001","unstructured":"P. Buneman , S. Khanna , and T. Wang-Chiew . Why and where: A characterization of data provenance . In J. Bussche and V. Vianu, editors, Database Theory -- ICDT 2001 , volume 1973 of Lecture Notes in Computer Science , pages 316 -- 330 . Springer Berlin Heidelberg , 2001. P. Buneman, S. Khanna, and T. Wang-Chiew. Why and where: A characterization of data provenance. In J. Bussche and V. Vianu, editors, Database Theory -- ICDT 2001, volume 1973 of Lecture Notes in Computer Science, pages 316--330. Springer Berlin Heidelberg, 2001."},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/3-540-45708-9_5","volume-title":"Advances in Cryptology - CRYPTO","author":"Camenisch J.","year":"2002","unstructured":"J. Camenisch and A. Lysyanskaya . Dynamic accumulators and application to efficient revocation of anonymous credentials . In M. Yung, editor, Advances in Cryptology - CRYPTO 2002 , volume 2442 of Lecture Notes in Computer Science , pages 61 -- 76 . Springer Berlin Heidelberg , 2002. J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 61--76. Springer Berlin Heidelberg, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89965-5_17"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.1999.736338"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288121"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 6th International AAAI Conference on Weblogs and Social Media","author":"Gao H.","year":"2012","unstructured":"H. Gao , J. Tang , and H. Liu . Exploring social-historical ties on location-based social networks . In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media , 2012 . H. Gao, J. Tang, and H. Liu. Exploring social-historical ties on location-based social networks. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"Ubiquitous Mobile Information and Collaboration Systems Workshop. Citeseer","author":"Gonz\u00e1lez-Tablas A. I.","year":"2003","unstructured":"A. I. Gonz\u00e1lez-Tablas , B. Ramos , and A. Ribagorda . Path-stamps: A proposal for enhancing security of location tracking applications . In Ubiquitous Mobile Information and Collaboration Systems Workshop. Citeseer , 2003 . A. I. Gonz\u00e1lez-Tablas, B. Ramos, and A. Ribagorda. Path-stamps: A proposal for enhancing security of location tracking applications. In Ubiquitous Mobile Information and Collaboration Systems Workshop. Citeseer, 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314313.1314318"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09)","author":"Hasan R.","year":"2009","unstructured":"R. Hasan , R. Sion , and M. Winslett . The case of the fake Picasso: Preventing history forgery with secure provenance . In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09) , pages 1 -- 12 . USENIX Association , 2009 . R. Hasan, R. Sion, and M. Winslett. The case of the fake Picasso: Preventing history forgery with secure provenance. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09), pages 1--12. USENIX Association, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699096"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411759.1411775"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734586"},{"key":"e_1_3_2_1_19_1","unstructured":"I. Maduako. Wanna hack a drone? possible with geo-location spoofing! Online at http:\/\/geoawesomeness.com\/?p=893 26th July 2012.  I. Maduako. Wanna hack a drone? possible with geo-location spoofing! Online at http:\/\/geoawesomeness.com\/?p=893 26th July 2012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653692"},{"key":"e_1_3_2_1_21_1","first-page":"43","volume-title":"Proceedings of the 2006 USENIX Annual Technical Conference","author":"Muniswamy-Reddy K.","year":"2006","unstructured":"K. Muniswamy-Reddy , D. Holland , U. Braun , and M. Seltzer . Provenance-aware storage systems . In Proceedings of the 2006 USENIX Annual Technical Conference , pages 43 -- 56 , 2006 . K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer. Provenance-aware storage systems. In Proceedings of the 2006 USENIX Annual Technical Conference, pages 43--56, 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514414"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"A formal model of provenance in distributed systems","volume":"9","author":"Souilah I.","year":"2009","unstructured":"I. Souilah , A. Francalanza , and V. Sassone . A formal model of provenance in distributed systems . TAPP , 9 : 1 -- 11 , 2009 . I. Souilah, A. Francalanza, and V. Sassone. A formal model of provenance in distributed systems. TAPP, 9:1--11, 2009.","journal-title":"TAPP"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2005.3"},{"key":"e_1_3_2_1_26_1","volume-title":"April","author":"VanGrove J.","year":"2010","unstructured":"J. VanGrove . Foursquare cracks down on cheaters. Online at http:\/\/mashable.com\/2010\/04\/07\/foursquare-cheaters\/ , April 2010 . J. VanGrove. Foursquare cracks down on cheaters. Online at http:\/\/mashable.com\/2010\/04\/07\/foursquare-cheaters\/, April 2010."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of The 21st IEEE International Conference on Network Protocols, ICNP '13","author":"Wang X.","year":"2013","unstructured":"X. Wang , J. Zhu , A. Pande , A. Raghuramu , P. Mohapatra , T. Abdelzaher , and R. Ganti . STAMP: Ad Hoc Spatial-Temporal Provenance Assurance for Mobile Users . In Proceedings of The 21st IEEE International Conference on Network Protocols, ICNP '13 , Gottingen, Germany , October 2013 . X. Wang, J. Zhu, A. Pande, A. Raghuramu, P. Mohapatra, T. Abdelzaher, and R. Ganti. STAMP: Ad Hoc Spatial-Temporal Provenance Assurance for Mobile Users. In Proceedings of The 21st IEEE International Conference on Network Protocols, ICNP '13, Gottingen, Germany, October 2013."},{"key":"e_1_3_2_1_28_1","volume-title":"Secure, private proofs of location. Technical report TR-667-03","author":"Waters B. R.","year":"2003","unstructured":"B. R. Waters and E. W. Felten . Secure, private proofs of location. Technical report TR-667-03 , Princeton University , January 2003 . B. R. Waters and E. W. Felten. Secure, private proofs of location. Technical report TR-667-03, Princeton University, January 2003."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.237"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INW.2001.915307"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590339"}},"subtitle":["towards secure provenance modeling for location proofs"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":30,"alternative-id":["10.1145\/2590296.2590339","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590339","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}