iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/11552413_146
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:11:59Z","timestamp":1725567119041},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540288947"},{"type":"electronic","value":"9783540319832"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11552413_146","type":"book-chapter","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T15:45:01Z","timestamp":1285775101000},"page":"1028-1035","source":"Crossref","is-referenced-by-count":1,"title":["Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform"],"prefix":"10.1007","author":[{"given":"Keon Myung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jee-Hyong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Myung Geun","family":"Chun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"146_CR1","series-title":"Lecture Notes in Artificial Intelligence","first-page":"14","volume-title":"A Multiagent Architecture for Privacy-Preserving ID-based Service in Ubiquitous Computing Environment.","author":"K.M. Lee","year":"2004","unstructured":"Lee, K.M., Lee, S.H.: A Multiagent Architecture for Privacy-Preserving ID-based Service in Ubiquitous Computing Environment. LNCS (LNAI), vol.\u00a03339, pp. 14\u201325. Springer, Heidelberg (2004)"},{"issue":"1","key":"146_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"146_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"R. Beresford","year":"2002","unstructured":"Beresford, R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2002)","journal-title":"IEEE Pervasive Computing"},{"key":"146_CR4","unstructured":"Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-Aware Location Sensor Networks (2003), http:\/\/systems.cs.colorado.edu\/Papers\/Generated\/2003PrivacyAwareSensors.html"},{"key":"146_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, X., Landay, J.: Modeling Privacy Control in Context-aware Systems. IEEE Pervasive\u00a01(3) (2002)","DOI":"10.1109\/MPRV.2002.1037723"},{"key":"146_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, p. 237. Springer, Heidelberg (2002)"},{"key":"146_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"S. Lederer","year":"2002","unstructured":"Lederer, S., Dey, A.K., Mankoff, J.: Everyday Privacy in Uniquitous Computing Environment. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, Springer, Heidelberg (2002)"},{"key":"146_CR8","doi-asserted-by":"crossref","unstructured":"Prasad, R., Schoo, P., Wang, H.: An Evolutionary Approach towards Ubiquitous Communications: A Security Perspective. In: Proc. of SAINT 2004: The 2004 Symposium on Applications & Internet (2004)","DOI":"10.1109\/SAINTW.2004.1268719"},{"key":"146_CR9","unstructured":"Osbakk, P., Ryan, N.: Expressing Privacy Preferences in terms of Invasiveness. In: Position Paper for the 2nd UK-UbiNet Workshop(University of Cambridge, UK) (2004)"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11552413_146.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:44:13Z","timestamp":1605642253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11552413_146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540288947","9783540319832"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11552413_146","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}