{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:51:01Z","timestamp":1764784261829},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_17","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"211-224","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Information Leakage in Wearable Applications"],"prefix":"10.1007","author":[{"given":"Babatunde","family":"Olabenjo","sequence":"first","affiliation":[]},{"given":"Dwight","family":"Makaroff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"17_CR1","series-title":"Health Informatics","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-61446-5_6","volume-title":"Digital Health","author":"T Boillat","year":"2018","unstructured":"Boillat, T., Rivas, H., Wac, K.: \u201cHealthcare on a Wris\u201d: increasing compliance through checklists on wearables in obesity (self-)management programs. In: Rivas, H., Wac, K. (eds.) Digital Health. HI, pp. 65\u201381. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-61446-5_6"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Chauhan, J., Seneviratne, S., Kaafar, M.A., Mahanti, A., Seneviratne, A.: Characterization of early smartwatch apps. In: PerCom Workshops, pp. 1\u20136. Sydney, Australia, March 2016","DOI":"10.1109\/PERCOMW.2016.7457170"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Chen, G., Meng, W., Copeland, J.: Revisiting mobile advertising threats with MAdLife. In: The World Wide Web Conference, WWW 2019, pp. 207\u2013217, San Francisco, CA, May 2019","DOI":"10.1145\/3308558.3313549"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/LSP.2016.2642300","volume":"24","author":"X Fafoutis","year":"2017","unstructured":"Fafoutis, X., Marchegiani, L., Papadopoulos, G.Z., Piechocki, R., Tryfonas, T., Oikonomou, G.: Privacy leakage of physical activity levels in wireless embedded wearable systems. IEEE Signal Process. Lett. 24(2), 136\u2013140 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: HinDroid: an intelligent Android malware detection system based on structured heterogeneous information network. In: KDD 2017, Halifax, Canada, pp. 1507\u20131515, August 2017","DOI":"10.1145\/3097983.3098026"},{"key":"17_CR6","unstructured":"Korner, J., Hitzges, L., Gehrke, D.: Goko Store: Home. \n                    https:\/\/goko.me\/"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Lee, M., Lee, K., Shim, J., Cho, S., Choi, J.: Security threat on wearable services: empirical study using a commercial smartband. In: ICCE-Asia, Seoul, South Korea, pp. 1\u20135, October 2016","DOI":"10.1109\/ICCE-Asia.2016.7804766"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-319-13841-1_14","volume-title":"Information Systems Security","author":"X Li","year":"2014","unstructured":"Li, X., Dong, X., Liang, Z.: A usage-pattern perspective for privacy ranking of Android apps. In: Prakash, A., Shyamasundar, R. (eds.) ICISS 2014. LNCS, vol. 8880, pp. 245\u2013256. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-13841-1_14"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Liu, R., Lin, F.X.: Understanding the characteristics of Android wear OS. In: ACM Mobisys, Singapore, Singapore, pp. 151\u2013164, June 2016","DOI":"10.1145\/2906388.2906398"},{"key":"17_CR10","unstructured":"Moonsamy, V., Batten, L.: Android applications: data leaks via advertising libraries. In: International Symposium on Information Theory and its Applications, Melbourne, Australia, pp. 314\u2013317, October 2014"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Mujahid, S.: Detecting wearable app permission mismatches: a case study on Android wear. In: 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, pp. 1065\u20131067, September 2017","DOI":"10.1145\/3106237.3121279"},{"key":"17_CR12","unstructured":"Paul, G., Irvine, J.: Privacy implications of wearable health devices. In: SIN 2014, Glasgow, UK, pp. 117:117\u2013117:121, September 2014"},{"key":"17_CR13","first-page":"1","volume":"2018","author":"W Sun","year":"2018","unstructured":"Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., Wang, G.: Security and privacy in the medical Internet of Things: a review. Secur. Commun. Netw. 2018, 1\u20139 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"17_CR14","unstructured":"Tumbleson, C., Winiewski, R.: Apktool - a tool for reverse engineering 3rd party, closed, binary Android apps. \n                    https:\/\/ibotpeaches.github.io\/Apktool\/"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Wu, S., Zhang, Y., Jin, B., Cao, W.: Practical static analysis of detecting intent-based permission leakage in Android application. In: IEEE ICCT, Chengdu, China, pp. 1953\u20131957, October 2017","DOI":"10.1109\/ICCT.2017.8359970"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, H., Rounte, A.: Analysis and testing of notifications in Android wear applications. In: International Conference on Software Engineering, Buenos Aires, Argentina, pp. 347\u2013357, May 2017","DOI":"10.1109\/ICSE.2017.39"},{"issue":"1","key":"17_CR17","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122\u2013129 (2017)","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:05:58Z","timestamp":1562771158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}