{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T17:26:18Z","timestamp":1769016378314,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF CNS Research Experience for Undergraduates","award":["1560134"],"award-info":[{"award-number":["1560134"]}]},{"name":"NSF CNS Research Experience for Teachers","award":["1801552"],"award-info":[{"award-number":["1801552"]}]},{"name":"U.S. Air Force Research Laboratory","award":["FA8750-17-S-7003"],"award-info":[{"award-number":["FA8750-17-S-7003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,12]]},"DOI":"10.1145\/3360774.3360800","type":"proceedings-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T14:56:00Z","timestamp":1580741760000},"page":"116-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Quantifying location privacy in permissioned blockchain-based internet of things (IoT)"],"prefix":"10.1145","author":[{"given":"Abdur R.","family":"Shahid","sequence":"first","affiliation":[{"name":"FIU"}]},{"given":"Niki","family":"Pissinou","sequence":"additional","affiliation":[{"name":"FIU"}]},{"given":"Laurent","family":"Njilla","sequence":"additional","affiliation":[{"name":"US-AFRL"}]},{"given":"Sheila","family":"Alemany","sequence":"additional","affiliation":[{"name":"FIU"}]},{"given":"Ahmed","family":"Imteaj","sequence":"additional","affiliation":[{"name":"FIU"}]},{"given":"Kia","family":"Makki","sequence":"additional","affiliation":[{"name":"TUA"}]},{"given":"Edwin","family":"Aguilar","sequence":"additional","affiliation":[{"name":"FIU"}]}],"member":"320","published-online":{"date-parts":[[2020,2,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2019. Amazon QLDB. https:\/\/aws.amazon.com\/qldb\/  Amazon. 2019. Amazon QLDB. https:\/\/aws.amazon.com\/qldb\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Blockchain-Based Proof of Location. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 146--153","author":"Amoretti Michele","year":"2018"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_4_1","unstructured":"Microsoft Azure. [n.d.]. Blockchain. https:\/\/azure.microsoft.com\/en-us\/solutions\/blockchain\/  Microsoft Azure. [n.d.]. Blockchain. https:\/\/azure.microsoft.com\/en-us\/solutions\/blockchain\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Noise reduction in speech processing","author":"Benesty Jacob"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054724"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"e_1_3_2_1_9_1","volume-title":"Using Blockchain for Peer-to-Peer Proof-of-Location. arXiv preprint arXiv:1607.00174","author":"Brambilla Giacomo","year":"2016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7509387"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhz015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119019138"},{"key":"e_1_3_2_1_14_1","first-page":"8","article-title":"Protecting against velocity-based, proximity-based, and external event attacks in location-centric social networks","volume":"2","author":"Ghinita Gabriel","year":"2016","journal-title":"ACM Transactions on Spatial Algorithms and Systems (TSAS)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18113894"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647719"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2777990"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287019"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2713341"},{"key":"e_1_3_2_1_21_1","unstructured":"J.P Morgan. 2019. Quorum. https:\/\/www.goquorum.com\/  J.P Morgan. 2019. Quorum. https:\/\/www.goquorum.com\/"},{"key":"e_1_3_2_1_22_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. bit-coin.org","author":"Nakamoto Satoshi","year":"2008"},{"key":"e_1_3_2_1_23_1","volume-title":"On the Activity Privacy of Blockchain for IoT. arXiv preprint arXiv:1812.08970","author":"Roulin Clemence","year":"2018"},{"key":"e_1_3_2_1_24_1","volume-title":"BlockAPP: Using Blockchain for Authentication and Privacy Preservation in IoV. In 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 1--6.","author":"Sharma Rohit","year":"2018"},{"key":"e_1_3_2_1_25_1","volume-title":"Blockchain Based Intelligent Vehicle Data sharing Framework. arXiv preprint arXiv:1708.09721","author":"Singh Madhusudan","year":"2017"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2327053"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.046"},{"key":"e_1_3_2_1_28_1","volume-title":"Blockchain-based Decentralized Trust Management in Vehicular Networks","author":"Yang Zhe","year":"2018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2487262"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2867541.2867781"}],"event":{"name":"MobiQuitous: Computing, Networking and Services","location":"Houston Texas USA","acronym":"MobiQuitous"},"container-title":["Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3360800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360774.3360800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:36Z","timestamp":1750203876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3360800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":30,"alternative-id":["10.1145\/3360774.3360800","10.1145\/3360774"],"URL":"https:\/\/doi.org\/10.1145\/3360774.3360800","relation":{},"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"2020-02-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}