{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:34:58Z","timestamp":1725798898335},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319100845"},{"type":"electronic","value":"9783319100852"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10085-2_24","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T23:14:54Z","timestamp":1408490094000},"page":"263-272","source":"Crossref","is-referenced-by-count":0,"title":["Ephemeral UUID for Protecting User Privacy in Mobile Advertisements"],"prefix":"10.1007","author":[{"given":"Keisuke","family":"Takemori","sequence":"first","affiliation":[]},{"given":"Toshiki","family":"Matsui","sequence":"additional","affiliation":[]},{"given":"Hideaki","family":"Kawabata","sequence":"additional","affiliation":[]},{"given":"Ayumu","family":"Kubota","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"MIC, Japan: Smartphone Privacy Initiative (2012), \n                    \n                      http:\/\/www.soumu.go.jp\/main_sosiki\/joho_tsusin\/eng\/presentation\/pdf\/Initiative.pdf"},{"key":"24_CR2","unstructured":"Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen, H.: Investigating User Privacy in Android Ad Libraries. IEEE Mobile Security Technologies (2012)"},{"key":"24_CR3","unstructured":"AdLantis, \n                    \n                      http:\/\/sp.www.adlantis.jp\/"},{"key":"24_CR4","unstructured":"i-mobile, \n                    \n                      http:\/\/i-mobile.co.jp\/en\/index.aspx"},{"key":"24_CR5","unstructured":"Nend, \n                    \n                      http:\/\/nend.net\/"},{"key":"24_CR6","unstructured":"Admob by Google, \n                    \n                      http:\/\/www.google.com\/ads\/admob\/"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Farahat, A., Sunnyvale, Bailey, M.C.: How effective is targeted advertising? In: 21st International Conference on World Wide Web, pp. 111\u2013120 (2012)","DOI":"10.1145\/2187836.2187852"},{"key":"24_CR8","unstructured":"European Commission: A comprehensive approach on personal data protection in the European Union: Right to be Forgotten (2010), \n                    \n                      http:\/\/ec.europa.eu\/justice\/news\/consulting_public\/0006\/com_2010_609_en.pdf"},{"key":"24_CR9","unstructured":"European Commission\u2019s data protection reform (2013), \n                    \n                      http:\/\/ec.europa.eu\/commission_2010-2014\/reding\/pdf\/news\/20131022-libe-data-protection_en.pdf"},{"key":"24_CR10","unstructured":"Federal Trade Commission (FTC): Endorses \u2018Do Not Track\u2019 to facilitate consumer choice about online tracking (2010), \n                    \n                      http:\/\/www.ftc.gov\/opa\/2010\/12\/privacyreport.shtm"},{"key":"24_CR11","unstructured":"FTC Staff Report: Self-Regulatory Principles For Online Behavioral Advertising (2009), \n                    \n                      http:\/\/www.ftc.gov\/os\/2009\/02\/P085400behavadreport.pdf"},{"key":"24_CR12","unstructured":"Do Not Track: Implementations, \n                    \n                      http:\/\/donottrack.us\/implementations"},{"key":"24_CR13","unstructured":"iOS Developer Library, ASIdentifierManager Class Reference, \n                    \n                      http:\/\/developer.apple.com\/library\/ios\/documentation\/AdSupport\/Reference\/ASIdentifierManager_Ref\/ASIdentifierManagerhtml\/\/apple_ref\/doc\/uid\/TP40012654"},{"key":"24_CR14","unstructured":"Android advertising ID, \n                    \n                      http:\/\/developer.android.com\/google\/play-services\/id.html"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Grace, M.C., Zhou, W., Jiang, X., Sadeghi, A.-R.: Unsafe exposure analysis of mobile in-app advertisements. In: ACM Conference on Security and Privacy in Wireless and Mobile Network, pp. 101\u2013112 (2012)","DOI":"10.1145\/2185448.2185464"},{"key":"24_CR16","unstructured":"Wireshark, \n                    \n                      http:\/\/www.wireshark.org\/"},{"key":"24_CR17","unstructured":"AdTruth, Device Fingerprinting, \n                    \n                      http:\/\/www.adtruth.com\/buzz\/press\/cookie-less-tracking-device-fingerprinting-vs-device-identification-technology"},{"key":"24_CR18","unstructured":"MIC, Japan: Smartphone Privacy Initiative II (2013), \n                    \n                      http:\/\/www.soumu.go.jp\/main_sosiki\/joho_tsusin\/eng\/presentation\/pdf\/Summary_II.pdf"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10085-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T12:30:48Z","timestamp":1558960248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10085-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319100845","9783319100852"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10085-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}