{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:51:10Z","timestamp":1770753070120,"version":"3.50.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076195","type":"print"},{"value":"9783319076201","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_27","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:55:03Z","timestamp":1402419303000},"page":"306-317","source":"Crossref","is-referenced-by-count":10,"title":["Socio-technical Security Analysis of Wireless Hotspots"],"prefix":"10.1007","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Huynen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Koenig","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"27_CR1","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1145\/1646353.1646388","volume":"53","author":"T. Chenoweth","year":"2010","unstructured":"Chenoweth, T., Minch, R., Tabor, S.: Wireless insecurity: examining user security behavior on public networks. Commun. ACM\u00a053(2), 134\u2013138 (2010)","journal-title":"Commun. ACM"},{"key":"27_CR2","unstructured":"Stakenburg, D., Crampton, J.: Underexposed risks of public wi-fi hotspots (2013), http:\/\/ComputerWeekly.Com (accessed April 23, 2014)"},{"key":"27_CR3","unstructured":"W.-F. Alliance. Wi-fi certified passpoint: A new program from the wi-fi alliance to enable seamless wi-fi access in hotspots (June 2012), http:\/\/www.wi-fi.org (accessed April 23, 2014)"},{"key":"27_CR4","unstructured":"802.11u-2011\u2013Amendment 9: Interworking with External Networks, IEEE Std., http:\/\/standards.ieee.org\/findstds\/standard\/802.11u-2011.html (accessed April 23, 2014)"},{"key":"27_CR5","unstructured":"Brodkin, J.: Nfl to block mobile streaming video in super bowl stadium (January 2014), http:\/\/arstechnica.com\/information-technology\/2014\/01\/nfl-to-block-mobile-streaming-video-in-super-bowl-stadium (accessed April 23, 2014)"},{"key":"27_CR6","series-title":"CHI 2009","doi-asserted-by":"crossref","first-page":"1993","DOI":"10.1145\/1518701.1519004","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"P. Klasnja","year":"2009","unstructured":"Klasnja, P., Consolvo, S., Jung, J., Greenstein, B.M., LeGrand, L., Powledge, P., Wetherall, D.: \u201dWhen I am on Wi-Fi, I am Fearless\u201d: privacy concerns & practices in everyday wi-fi use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2009, pp. 1993\u20132002. ACM, New York (2009)"},{"key":"27_CR7","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-30436-1_23","volume-title":"Information Security and Privacy Research","author":"G. Bella","year":"2012","unstructured":"Bella, G., Coles-Kemp, L.: Layered Analysis of Security Ceremonies. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 273\u2013286. Springer, Heidelberg (2012)"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-41098-7_9","volume-title":"Security and Trust Management","author":"A. Ferreira","year":"2013","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., Rivas, S.: Socio-technical study on the effect of trust and context when choosing wifi names. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol.\u00a08203, pp. 131\u2013143. Springer, Heidelberg (2013)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Giustolisi, R., Huynen, J., Koenig, V., Lenzini, G.: Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. In: Proc. of the 12th IEEE TrustComm 2013, pp. 1553\u20131558 (2013)","DOI":"10.1109\/TrustCom.2013.190"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Bella, G., Giustolisi, R., Lenzini, G.: Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers. In: Proc. of PST 2013. IFIP, pp. 309\u2013316 (2013)","DOI":"10.1109\/PST.2013.6596067"},{"key":"27_CR11","unstructured":"3GPP Technical Specification 24;312 Access Network Discovery and Selection Function (ANDSF) Management Object (MO), 3GPP Std., Rev. 12.3.0 (December 2013), http:\/\/www.3gpp.org\/DynaReport\/24312.htm (accessed April 23, 2014)"},{"key":"27_CR12","unstructured":"Cisco, Cisco context-aware service configuration guide - 7.3, http:\/\/www.cisco.com\/ (accessed April 23, 2014)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T13:14:42Z","timestamp":1649337282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}