Jun Anzai, Tsutomu Matsumoto. How to Construct Secure Cryptographic Location-Based Services. In Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuan-Shun Dai, Laurence Tianruo Yang, editors, Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings. Volume 3823 of Lecture Notes in Computer Science, pages 894-904, Springer, 2005. [doi]
@inproceedings{AnzaiM05:0, title = {How to Construct Secure Cryptographic Location-Based Services}, author = {Jun Anzai and Tsutomu Matsumoto}, year = {2005}, doi = {10.1007/11596042_92}, url = {http://dx.doi.org/10.1007/11596042_92}, tags = {rule-based}, researchr = {https://researchr.org/publication/AnzaiM05%3A0}, cites = {0}, citedby = {0}, pages = {894-904}, booktitle = {Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan-Shun Dai and Laurence Tianruo Yang}, volume = {3823}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-30803-2}, }