{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:41Z","timestamp":1725562781664},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_29","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"366-373","source":"Crossref","is-referenced-by-count":2,"title":["Secure Location Verification"],"prefix":"10.1007","author":[{"given":"Georg T.","family":"Becker","sequence":"first","affiliation":[]},{"given":"Sherman C.","family":"Lo","sequence":"additional","affiliation":[]},{"given":"David S.","family":"De Lorenzo","sequence":"additional","affiliation":[]},{"given":"Per K.","family":"Enge","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Denning, D.E., MacDoran, P.F.: Location-based authentication: grounding cyberspace for better security. Computer Fraud & Security, 12\u201316 (February 1996)","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"29_CR2","unstructured":"Lo, S.C., De Lorenzo, D.S., Enge, P.K., Akos, D., Bradley, P.: Signal authentication - a secure civil gnss for today. In: inside GNSS, September 2009, pp. 30\u201339 (2009)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-03356-8_23","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"N. Chandran","year":"2009","unstructured":"Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol.\u00a05677, pp. 391\u2013407. Springer, Heidelberg (2009)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-540-30114-1_17","volume-title":"Information Hiding","author":"M.G. Kuhn","year":"2004","unstructured":"Kuhn, M.G.: An Asymmetric Security Mechanism for Navigation Signals. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 239\u2013252. Springer, Heidelberg (2004)"},{"key":"29_CR5","unstructured":"Humphreys, T., Ledvina, B., Psiaki, M., O\u2019Hanlon, B., Kintner, P.: Assessing the Spoofing Threat. GPS World, 28\u201338 (January 2009)"},{"key":"29_CR6","unstructured":"Scott, L.: Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems. In: Proc. ION GPS\/GNSS, pp. 1543\u20131552 (2003)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T21:42:40Z","timestamp":1552945360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}