{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:04:47Z","timestamp":1774368287530,"version":"3.50.1"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030755386","type":"print"},{"value":"9783030755393","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75539-3_16","type":"book-chapter","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T23:36:24Z","timestamp":1620689784000},"page":"375-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Mesh Messaging in Large-Scale Protests: Breaking Bridgefy"],"prefix":"10.1007","author":[{"given":"Martin R.","family":"Albrecht","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Blasco","sequence":"additional","affiliation":[]},{"given":"Rikke Bjerg","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Lenka","family":"Marekov\u00e1","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,11]]},"reference":[{"key":"16_CR1","unstructured":"Bridgefy, April 2020. https:\/\/web.archive.org\/web\/20200411143157\/www.bridgefy.me\/"},{"key":"16_CR2","doi-asserted-by":"publisher","unstructured":"Adomnicai, A., Fournier, J.J.A., Masson, L.: Hardware security threats against Bluetooth mesh networks. In: 2018 IEEE Conference on Communications and Network Security, CNS 2018, Beijing, China, 30 May\u20131 June 2018, pp. 1\u20139. IEEE (2018). https:\/\/doi.org\/10.1109\/CNS.2018.8433184","DOI":"10.1109\/CNS.2018.8433184"},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"\u00c1lvarez, F., Almon, L., Hahn, A., Hollick, M.: Toxic friends in your network: breaking the Bluetooth Mesh friendship concept. In: Mehrnezhad, M., van der Merwe, T., Hao, F. (eds.) Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, 11 November 2019, pp. 1\u201312. ACM (2019). https:\/\/doi.org\/10.1145\/3338500.3360334","DOI":"10.1145\/3338500.3360334"},{"key":"16_CR4","unstructured":"Alwen, J., et al.: Keep the dirt: Tainted TreeKEM, an efficient and provably secure continuous group key agreement protocol. Cryptology ePrint Archive, Report 2019\/1489 (2019). https:\/\/eprint.iacr.org\/2019\/1489"},{"key":"16_CR5","unstructured":"Alwen, J., Coretti, S., Dodis, Y., Tselekounis, Y.: Security analysis and improvements for the IETF MLS standard for group messaging. Cryptology ePrint Archive, Report 2019\/1189 (2019). https:\/\/eprint.iacr.org\/2019\/1189"},{"key":"16_CR6","unstructured":"Aviram, N., et al.: DROWN: breaking TLS using SSLv2. In: Holz, T., Savage, S. (eds.): USENIX Security 2016, pp. 689\u2013706. USENIX Association, August 2016"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-642-32009-5_36","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"R Bardou","year":"2012","unstructured":"Bardou, R., Focardi, R., Kawamoto, Y., Simionato, L., Steel, G., Tsay, J.-K.: Efficient padding oracle attacks on cryptographic hardware. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 608\u2013625. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_36"},{"key":"16_CR8","unstructured":"BBC News: Iraqis use FireChat messaging app to overcome net block, June 2014. http:\/\/web.archive.org\/web\/20190325080943\/https:\/\/www.bbc.com\/news\/technology-27994309k"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Becker, J.K., Li, D., Starobinski, D.: Tracking anonymized Bluetooth devices. In: Proceedings on Privacy Enhancing Technologies, vol. 2019, no. 3, pp. 50\u201365 (2019)","DOI":"10.2478\/popets-2019-0036"},{"key":"16_CR10","unstructured":"Bhavani, D.K.: Internet shutdown? Why Bridgefy app that enables offline messaging is trending in India, December 2019. http:\/\/web.archive.org\/web\/20200105053448\/https:\/\/www.thehindu.com\/sci-tech\/technology\/internet-shutdown-why-bridgefy-app-that-enables-offline-messaging-is-trending-in-india\/article30336067.ece"},{"key":"16_CR11","unstructured":"Bland, A.: FireChat - the messaging app that\u2019s powering the Hong Kong protests, September 2014. http:\/\/web.archive.org\/web\/20200328142327\/https:\/\/www.theguardian.com\/world\/2014\/sep\/29\/firechat-messaging-app-powering-hong-kong-protests"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201998","author":"D Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1\u201312. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0055716"},{"key":"16_CR13","unstructured":"Bluetooth SIG: Core specification 5.1, January 2019. https:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification\/"},{"key":"16_CR14","unstructured":"B\u00f6ck, H., Somorovsky, J., Young, C.: Return of Bleichenbacher\u2019s oracle threat (ROBOT). In: Enck, W., Felt, A.P. (eds.) USENIX Security 2018, pp. 817\u2013849. USENIX Association, August 2018"},{"key":"16_CR15","unstructured":"Borak, M.: We tested a messaging app used by Hong Kong protesters that works without an internet connection, September 2019. http:\/\/web.archive.org\/web\/20191206182048\/https:\/\/www.abacusnews.com\/digital-life\/we-tested-messaging-app-used-hong-kong-protesters-works-without-internet-connection\/article\/3025661"},{"key":"16_CR16","unstructured":"Boyle, G.: 20 Years of Bleichenbacher attacks. Technical Reports RHUL-ISG-2019-1. Information Security Group, Royal Holloway University of London (2019)"},{"key":"16_CR17","unstructured":"Brewster, T.: Hong Kong protesters are using this \u2018mesh\u2019 messaging app\u2013but should they trust it? September 2019. http:\/\/web.archive.org\/web\/20191219071731\/https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/09\/04\/hong-kong-protesters-are-using-this-mesh-messaging-app-but-should-they-trust-it\/"},{"key":"16_CR18","unstructured":"Bridgefy: Developers (2018). https:\/\/blog.bridgefy.me\/developers.html, https:\/\/archive.vn\/yjg9f"},{"key":"16_CR19","unstructured":"Bridgefy: Bridgefy\u2019s commitment to privacy and security, August 2020. http:\/\/web.archive.org\/web\/20200826183604\/https:\/\/bridgefy.me\/bridgefys-commitment-to-privacy-and-security\/"},{"key":"16_CR20","unstructured":"Bridgefy: Offline messaging, April 2020. https:\/\/web.archive.org\/20200411143133\/play.google.com\/store\/apps\/details?id=me.bridgefy.main"},{"key":"16_CR21","unstructured":"Bridgefy: Technical article on our security updates, November 2020. http:\/\/web.archive.org\/web\/20201102093540\/https:\/\/bridgefy.me\/technical-article-on-our-security-updates\/"},{"key":"16_CR22","unstructured":"Cort\u00e9s, V.: Bridgefy sees massive spike in downloads during Hong Kong protests, August 2019. http:\/\/web.archive.org\/web\/20191013072633\/www.contxto.com\/en\/mexico\/mexican-bridgefy-sees-massive-spike-in-downloads-during-hong-kong-protests\/"},{"key":"16_CR23","unstructured":"Cremers, C., Hale, B., Kohbrok, K.: Efficient post-compromise security beyond one group. Cryptology ePrint Archive, Report 2019\/477 (2019). https:\/\/eprint.iacr.org\/2019\/477"},{"key":"16_CR24","doi-asserted-by":"publisher","unstructured":"Dunning, J.P.: Taming the blue beast: a survey of Bluetooth based threats. IEEE Secur. Priv. 8(2), 20\u201327 (2010). https:\/\/doi.org\/10.1109\/MSP.2010.3","DOI":"10.1109\/MSP.2010.3"},{"key":"16_CR25","unstructured":"Duong, T., Rizzo, J.: The CRIME attack. Presentation at Ekoparty Security Conference (2012)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Ermoshina, K., Halpin, H., Musiani, F.: Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols. In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017) (2017)","DOI":"10.14722\/eurousec.2017.23016"},{"key":"16_CR27","unstructured":"Fifield, D.: A better zip bomb. In: 13th USENIX Workshop on Offensive Technologies (WOOT 2019), Santa Clara. USENIX Association, August 2019"},{"key":"16_CR28","unstructured":"Frida: A dynamic instrumentation framework, v12.8.9, February 2020. https:\/\/frida.re\/"},{"key":"16_CR29","unstructured":"Furuhashi, S.: MessagePack (2008). https:\/\/msgpack.org\/"},{"key":"16_CR30","unstructured":"Gardner-Stephen, P.: The Serval Project (2017). http:\/\/www.servalproject.org\/"},{"key":"16_CR31","unstructured":"Garman, C., Green, M., Kaptchuk, G., Miers, I., Rushanan, M.: Dancing on the lip of the volcano: chosen ciphertext attacks on Apple iMessage. In: Holz, T., Savage, S. (eds.): USENIX Security 2016, pp. 655\u2013672. USENIX Association, August 2016"},{"key":"16_CR32","unstructured":"Gluck, Y., Harris, N., Prado, A.: BREACH: reviving the CRIME attack. Black Hat USA (2013)"},{"key":"16_CR33","unstructured":"Goodin, D.: Bridgefy, the messenger promoted for mass protests, is a privacy disaster, August 2020. https:\/\/arstechnica.com\/features\/2020\/08\/bridgefy-the-app-promoted-for-mass-protests-is-a-privacy-disaster\/"},{"key":"16_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-030-04762-7_4","volume-title":"Security Standardisation Research","author":"H Halpin","year":"2018","unstructured":"Halpin, H., Ermoshina, K., Musiani, F.: Co-ordinating developers and high-risk users of privacy-enhanced secure messaging protocols. In: Cremers, C., Lehmann, A. (eds.) SSR 2018. LNCS, vol. 11322, pp. 56\u201375. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04762-7_4"},{"key":"16_CR35","doi-asserted-by":"publisher","unstructured":"Hassan, S.S., Bibon, S.D., Hossain, M.S., Atiquzzaman, M.: Security threats in Bluetooth technology. Comput. Secur. 74, 308\u2013322 (2018). https:\/\/doi.org\/10.1016\/j.cose.2017.03.008","DOI":"10.1016\/j.cose.2017.03.008"},{"key":"16_CR36","unstructured":"HypeLabs: The Hype SDK: a technical overview (2019). https:\/\/hypelabs.io\/documents\/Hype-SDK.pdf"},{"key":"16_CR37","unstructured":"HypeLabs (2020). https:\/\/hypelabs.io"},{"key":"16_CR38","unstructured":"IETF: DEFLATE compressed data format specification version 1.3, May 1996. https:\/\/tools.ietf.org\/html\/rfc1951"},{"key":"16_CR39","unstructured":"IETF: GZIP file format specification version 4.3, May 1996. https:\/\/tools.ietf.org\/html\/rfc1952"},{"key":"16_CR40","unstructured":"IETF: PKCS #1: RSA encryption version 1.5, March 1998. https:\/\/tools.ietf.org\/html\/rfc2313"},{"key":"16_CR41","unstructured":"Jasek, S.: GATTacking Bluetooth smart devices (2016). https:\/\/github.com\/securing\/docs\/raw\/master\/whitepaper.pdf"},{"key":"16_CR42","unstructured":"Josh Horwitz, T.i.A.: Unblockable? Unstoppable? FireChat messaging app unites China and Taiwan in free speech$$\\ldots $$ and it\u2019s not pretty, March 2014. http:\/\/web.archive.org\/web\/20141027180653\/https:\/\/www.techinasia.com\/unblockable-unstoppable-firechat-messaging-app-unites-china-and-taiwan-in-free-speech-and-its-not-pretty\/"},{"key":"16_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-45661-9_21","volume-title":"Fast Software Encryption","author":"J Kelsey","year":"2002","unstructured":"Kelsey, J.: Compression and information leakage of plaintext. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 263\u2013276. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45661-9_21"},{"key":"16_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-45238-6_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"V Kl\u00edma","year":"2003","unstructured":"Kl\u00edma, V., Pokorn\u00fd, O., Rosa, T.: Attacking RSA-based sessions in SSL\/TLS. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 426\u2013440. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45238-6_33"},{"key":"16_CR45","unstructured":"Koetsier, J.: Hong Kong protestors using mesh messaging app China can\u2019t block: usage up 3685%, September 2019. https:\/\/web.archive.org\/web\/20200411154603\/www.forbes.com\/sites\/johnkoetsier\/2019\/09\/02\/hong-kong-protestors-using-mesh-messaging-app-china-cant-block-usage-up-3685\/"},{"key":"16_CR46","unstructured":"Magaisa, A.T.: https:\/\/twitter.com\/wamagaisa\/status\/1288817111796797440. http:\/\/archive.today\/DVRZf, July 2020"},{"key":"16_CR47","unstructured":"Mihindukulasuriya, R.: FireChat, Bridgefy see massive rise in downloads amid internet shutdowns during CAA protests, December 2019. http:\/\/web.archive.org\/web\/20200109212954\/https:\/\/theprint.in\/india\/firechat-bridgefy-see-massive-rise-in-downloads-amid-internet-shutdowns-during-caa-protests\/340058\/"},{"key":"16_CR48","unstructured":"Mohan, P.: How the internet shutdown in Kashmir is splintering India\u2019s democracy, March 2020. http:\/\/web.archive.org\/web\/20200408111230\/https:\/\/www.fastcompany.com\/90470779\/how-the-internet-shutdown-in-kashmir-is-splintering-indias-democracy"},{"key":"16_CR49","unstructured":"Mudzingwa, F.: This offline messenger that might keep you connected if the govt decides to shut down the internet, August 2020. https:\/\/web.archive.org\/web\/20200816101930\/www.techzim.co.zw\/2020\/07\/bridgefy-is-an-offline-messenger-that-might-keep-you-connected-if-the-govt-decides-to-shut-down-the-internet\/"},{"key":"16_CR50","unstructured":"News, H.: Hong Kong protestors using Bridgefy\u2019s Bluetooth-based mesh network messaging app, August 2019. https:\/\/web.archive.org\/web\/20191016114954\/news.ycombinator.com\/item?id=20861948"},{"key":"16_CR51","unstructured":"Ng, B.: Bridgefy: a startup that enables messaging without internet, August 2019. http:\/\/archive.today\/2020.06.07-120425\/https:\/\/www.ejinsight.com\/eji\/article\/id\/2230121\/20190826-bridgefy-a-startup-that-enables-messaging-without-internet"},{"key":"16_CR52","unstructured":"Open Garden: FireChat, October 2019. http:\/\/web.archive.org\/web\/20200111174316\/https:\/\/www.opengarden.com\/firechat\/"},{"key":"16_CR53","unstructured":"Open Mesh: B.A.T.M.A.N. Advanced (2020). https:\/\/www.open-mesh.org\/projects\/batman-adv\/wiki"},{"key":"16_CR54","unstructured":"Purohit, K.: Whatsapp to Bridgefy, what Hong Kong taught India\u2019s leaderless protesters, December 2019. http:\/\/web.archive.org\/web\/20200406103939\/https:\/\/www.scmp.com\/week-asia\/politics\/article\/3042633\/whatsapp-bridgefy-what-hong-kong-taught-indias-leaderless"},{"key":"16_CR55","unstructured":"Rogers, M., Saitta, E., Grote, T., Dehm, J., Wieder, B.: Briar, March 2018. https:\/\/web.archive.org\/web\/20191016114519\/briarproject.org\/"},{"key":"16_CR56","unstructured":"Ryan, M.: Bluetooth: with low energy comes low security. In: Proceedings of the 7th USENIX Conference on Offensive Technologies (WOOT 2013), p. 4. USENIX Association, USA (2013)"},{"key":"16_CR57","unstructured":"Schwartz, L.: The world\u2019s protest app of choice, August 2020. https:\/\/restofworld.org\/2020\/the-worlds-protest-app-of-choice\/, http:\/\/archive.today\/5kOhr"},{"key":"16_CR58","unstructured":"SIG, B.: Mesh profile specification 1.0.1, January 2019. https:\/\/www.bluetooth.com\/specifications\/mesh-specifications\/"},{"key":"16_CR59","unstructured":"Silva, M.D.: Hong Kong protestors are once again using mesh networks to preempt an internet shutdown, September 2019. http:\/\/archive.today\/2019.09.20-220517\/https:\/\/qz.com\/1701045\/hong-kong-protestors-use-bridgefy-to-preempt-internet-shutdown\/"},{"key":"16_CR60","unstructured":"Sivakumaran, P., Blasco, J.: A study of the feasibility of co-located app attacks against BLE and a large-scale analysis of the current application-layer security landscape. In: Heninger, N., Traynor, P. (eds.) USENIX Security 2019, pp. 1\u201318. USENIX Association, August 2019"},{"key":"16_CR61","unstructured":"Skylot: Jadx - Dex to Java decompiler, v1.1.0, December 2019. https:\/\/github.com\/skylot\/jadx"},{"key":"16_CR62","unstructured":"SMEX: Lebanon protests: how to communicate securely in case of a network disruption, October 2019. https:\/\/smex.org\/lebanon-protests-how-to-communicate-securely-in-case-of-a-network-disruption-2\/, http:\/\/archive.today\/hx1lp"},{"key":"16_CR63","unstructured":"Software Freedom Law Centre, India: Internet shutdown tracker (2020). https:\/\/internetshutdowns.in\/"},{"key":"16_CR64","unstructured":"Stein, W., et al.: Sage mathematics software version 9.0. The Sage Development Team (2019). http:\/\/www.sagemath.org"},{"key":"16_CR65","unstructured":"Subnodes: Subnodes (2018). http:\/\/subnodes.org\/"},{"key":"16_CR66","unstructured":"Sullivan, N., Turner, S., Kaduk, B., Cohn-Gordon, K., et al.: Messaging Layer Security (MLS), November 2018. https:\/\/datatracker.ietf.org\/wg\/mls\/about\/"},{"key":"16_CR67","unstructured":"Teknologiia Lebanon: Lebanese protesters are using this \u2018Bridgefy\u2019 messaging app \u2013 what is it? January 2020. https:\/\/medium.com\/@teknologiialb\/lebanese-protesters-are-using-this-bridgefy-messaging-app-what-is-it-74614e169197, https:\/\/archive.vn\/udqly"},{"key":"16_CR68","unstructured":"The Stranger: How to message people at protests even without internet access, June 2020. https:\/\/www.thestranger.com\/slog\/2020\/06\/03\/43829749\/how-to-message-people-at-protests-even-without-internet-access, http:\/\/archive.is\/8UrWQ"},{"key":"16_CR69","unstructured":"Twitter: Bridgefy search, June 2020. https:\/\/twitter.com\/search?q=bridgefy, http:\/\/archive.today\/hwklY"},{"key":"16_CR70","unstructured":"Twitter - B1O15J, August 2020. https:\/\/twitter.com\/B1O15J\/status\/1294603355277336576, https:\/\/archive.vn\/dkPqD"},{"key":"16_CR71","unstructured":"Twitter - Bridgefy, November 2019. https:\/\/twitter.com\/bridgefy\/status\/1197191632665415686, http:\/\/archive.today\/aNKQy"},{"key":"16_CR72","unstructured":"Twitter - Bridgefy, December 2019. https:\/\/twitter.com\/bridgefy\/status\/1209924773486170113, http:\/\/archive.today\/aQZDL"},{"key":"16_CR73","unstructured":"Twitter - Bridgefy, January 2020. https:\/\/twitter.com\/bridgefy\/status\/1216473058753597453, http:\/\/archive.today\/x1gG4"},{"key":"16_CR74","unstructured":"Twitter - Bridgefy, June 2020. https:\/\/twitter.com\/bridgefy\/status\/1268905414248153089. http:\/\/archive.today\/odSbW"},{"key":"16_CR75","unstructured":"Twitter - Bridgefy, July 2020. https:\/\/twitter.com\/bridgefy\/status\/1287768436244983808, https:\/\/archive.vn\/WQfZm"},{"key":"16_CR76","unstructured":"Twitter - Bridgefy, June 2020. https:\/\/twitter.com\/bridgefy\/status\/1268015807252004864, http:\/\/archive.today\/uKNRm"},{"key":"16_CR77","unstructured":"Twitter - Bridgefy, August 2020. https:\/\/twitter.com\/bridgefy\/status\/1289576487004168197, https:\/\/archive.vn\/zbxgR"},{"key":"16_CR78","unstructured":"Twitter - Bridgefy, August 2020. https:\/\/twitter.com\/bridgefy\/status\/1292880821725036545, https:\/\/archive.vn\/tKr0t"},{"key":"16_CR79","unstructured":"Twitter - Bridgefy, June 2020. https:\/\/twitter.com\/bridgefy\/status\/1267469099266965506, http:\/\/archive.today\/40pzC"},{"key":"16_CR80","doi-asserted-by":"publisher","unstructured":"Uher, J., Mennecke, R.G., Farroha, B.S.: Denial of sleep attacks in Bluetooth Low Energy wireless sensor networks. In: Brand, J., Valenti, M.C., Akinpelu, A., Doshi, B.T., Gorsic, B.L. (eds.) 2016 IEEE Military Communications Conference, MILCOM 2016, Baltimore, MD, USA, 1\u20133 November 2016, pp. 1231\u20131236. IEEE (2016). https:\/\/doi.org\/10.1109\/MILCOM.2016.7795499","DOI":"10.1109\/MILCOM.2016.7795499"},{"key":"16_CR81","unstructured":"Wakefield, J.: Hong Kong protesters using Bluetooth Bridgefy app, September 2019. http:\/\/web.archive.org\/web\/20200305062625\/https:\/\/www.bbc.co.uk\/news\/technology-49565587"},{"key":"16_CR82","doi-asserted-by":"crossref","unstructured":"Zuo, C., Wen, H., Lin, Z., Zhang, Y.: Automatic fingerprinting of vulnerable BLE IoT devices with static UUIDs from mobile apps. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1469\u20131483. ACM (2019)","DOI":"10.1145\/3319535.3354240"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75539-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:07:49Z","timestamp":1710263269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75539-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030755386","9783030755393"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75539-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CT-RSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cryptographers\u2019 Track at the RSA Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Francisco, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ctrsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/site\/ctrsa2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"websubrev","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.25","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}