{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:03:19Z","timestamp":1725890599597},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540706298"},{"type":"electronic","value":"9783540706304"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70630-4_11","type":"book-chapter","created":{"date-parts":[[2008,7,22]],"date-time":"2008-07-22T09:20:10Z","timestamp":1216718410000},"page":"167-186","source":"Crossref","is-referenced-by-count":7,"title":["Chattering Laptops"],"prefix":"10.1007","author":[{"given":"Tuomas","family":"Aura","sequence":"first","affiliation":[]},{"given":"Janne","family":"Lindqvist","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Roe","sequence":"additional","affiliation":[]},{"given":"Anish","family":"Mohammed","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Akritidis, P., Chin, W.Y., Lam, V.T., Sidiroglou, S., Anagnostakis, K.G.: Proximity breeds danger: Emerging threats in metro-area wireless networks. In: Proceedings of 16th USENIX Security Symposium, Boston, MA, USA, August 2007. USENIX Association (2007)"},{"issue":"6","key":"11_CR2","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A.V. Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM\u00a018(6), 333\u2013340 (1975)","journal-title":"Communications of the ACM"},{"key":"11_CR3","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). Research Report RZ 3485, IBM (March 2003)"},{"key":"11_CR4","volume-title":"Proceedings of 5th ACM Workshop on Privacy in the Electronic Society (WPES 2006)","author":"T. Aura","year":"2006","unstructured":"Aura, T., Kuhn, T.A., Roe, M.: Scanning electronic documents for personally identifiable information. In: Proceedings of 5th ACM Workshop on Privacy in the Electronic Society (WPES 2006), Alexandria, VA, USA, October 2006. ACM Press, New York (2006)"},{"key":"11_CR5","volume-title":"Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm 2007)","author":"T. Aura","year":"2007","unstructured":"Aura, T., Roe, M., Murdoch, S.J.: Securing network location awareness with authenticated DHCP. In: Proceedings of 3rd International Conference on Security and Privacy in Communication Networks (SecureComm 2007), Nice, France, September 2007. IEEE Press, Los Alamitos (2007)"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1140086.1140098","volume":"36","author":"A. Broido","year":"2006","unstructured":"Broido, A., Shang, H., Fomenkov, M., Hyun, Y., Claffy, K.: The Windows of private DNS updates. Computer Communication Review (ACM SIGCOMM)\u00a036(3), 93\u201398 (2006)","journal-title":"Computer Communication Review (ACM SIGCOMM)"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"11_CR9","unstructured":"Cheshire, S., Krochmal, M.: Multicast DNS. Internet-Draft draft-cheshire-dnsext-multicastdns-06, IETF, Expired (August 2006)"},{"key":"11_CR10","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of 13th Usenix Security Symposium, San Diego, CA, USA, August 2004, pp. 321\u2013336. USENIX (2004)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing Privacy Enhancing Technologies","author":"I. Clarke","year":"2001","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 46\u201366. Springer, Heidelberg (2001)"},{"key":"11_CR12","volume-title":"Web Privacy with P3P","author":"L.F. Cranor","year":"2002","unstructured":"Cranor, L.F.: Web Privacy with P3P. O\u2019Reilly, Sebastopol (2002)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Cuellar, J.R., Morris Jr., J.B., Mulligan, D.K., Peterson, J., Polk, J.M.: Geopriv requirements. RFC 3693, IETF (February 2004)","DOI":"10.17487\/rfc3693"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482. Springer, Heidelberg (2003)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA. USENIX Association ( August 2004)","DOI":"10.21236\/ADA465464"},{"key":"11_CR16","unstructured":"Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J.V., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: Vancouver, B.C. (ed.) 15th Proceedings of USENIX Security Symposium, Canada, July 2006, pp. 167\u2013178. USENIX Association (2006)"},{"key":"11_CR17","unstructured":"Gerdes, R., Daniels, T., Mina, M., Russell, S.: Device identification via analog signal fingerprinting: A matched filter approach. In: Proceedings of 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, USA, February 2006. Internet Society (2006)"},{"key":"11_CR18","first-page":"11","volume-title":"Proceedings of IEEE Symposium on Research in Security and Privacy","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, USA, April 1982, pp. 11\u201320. IEEE Computer Society Press, Los Alamitos (1982)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys 2003: The First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, May 2003, pp. 31\u201342. USENIX Association (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. In: Proceedings of 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), pp. 46\u201355 (2003)","DOI":"10.1145\/941326.941334"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_10","volume-title":"Privacy Enhancing Technologies","author":"S. Guha","year":"2007","unstructured":"Guha, S., Francis, P.: Identity trail: Covert surveillance using DNS. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776. Springer, Heidelberg (2007)"},{"key":"11_CR22","unstructured":"Greenstein, B., Gummadi, R., Pang, J., Chen, M.Y., Kohno, T., Seshan, S., Wetherall, D.: Can Ferris Bueller still have his day off? Protecting privacy in the wireless era. In: Proceedings of 11th Workshop on Hot Topics in Operating Systems (HotOS XI), San Diego, CA, USA, May 2007. USENIX Association (2007)"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1145\/1247660.1247689","volume-title":"Proceedings of 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007)","author":"T. Jiang","year":"2007","unstructured":"Jiang, T., Wang, H.J., Hu, Y.-C.: Preserving location privacy in wireless LANs. In: Proceedings of 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, USA, June 2007, pp. 246\u2013257. ACM Press, New York (2007)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Johnson, D.B., Perkins, C.: Mobility support in IPv6. RFC 3775, IETF (June 2004)","DOI":"10.17487\/rfc3775"},{"key":"11_CR25","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"T. Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2005. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/1102199.1102217","volume-title":"Proceedings of Workshop on Privacy in Electronic Society (WPES 2005)","author":"B. Kowitz","year":"2005","unstructured":"Kowitz, B., Cranor, L.: Peripheral privacy notifications for wireless networks. In: Proceedings of Workshop on Privacy in Electronic Society (WPES 2005), Alexandria, VA, USA, November 2005, pp. 90\u201396. ACM Press, New York (2005)"},{"issue":"3","key":"11_CR27","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MC.2003.1185208","volume":"36","author":"G. Lawton","year":"2003","unstructured":"Lawton, G.: Instant messaging puts on a business suit. Computer\u00a036(3), 14\u201316 (2003)","journal-title":"Computer"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1179601.1179612","volume-title":"Proceedings of Workshop on Privacy in Electronic Society (WPES 2006)","author":"J. Lindqvist","year":"2006","unstructured":"Lindqvist, J., Takkinen, L.: Privacy management for secure mobility. In: Proceedings of Workshop on Privacy in Electronic Society (WPES 2006), Alexandria, VA, USA, October 2006, pp. 63\u201366. ACM Press, New York (2006)"},{"key":"11_CR29","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol \u2014 Version 2. Internet-Draft draft-moeller-v2-01, IETF, Expired (July 2003)"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1180405.1180410","volume-title":"Proceedings of ACM Conference on Computer and Communications Security (CCS 2006)","author":"S.J. Murdoch","year":"2006","unstructured":"Murdoch, S.J.: Hot or not: Revealing hidden services by their clock skew. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, USA, November 2006, pp. 27\u201336. ACM Press, New York (2006)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Narten, T., Draves, R.: Privacy extensions for stateless address autoconfiguration in IPv6. RFC 3041, IETF (January 2001)","DOI":"10.17487\/rfc3041"},{"key":"11_CR32","volume-title":"Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI)","author":"J. Pang","year":"2007","unstructured":"Pang, J., Greenstein, B., McCoy, D., Seshan, S., Wetherall, D.: Tryst: The case for confidential service discovery. In: Proceedings of the 6th Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, CA, USA, November 2007. ACM Press, New York (2007)"},{"key":"11_CR33","volume-title":"Proceedings of 13th Annual International Conference on Mobile Computing and Networking (MobiCom 2007)","author":"J. Pang","year":"2007","unstructured":"Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: Proceedings of 13th Annual International Conference on Mobile Computing and Networking (MobiCom 2007), Montreal, QC, Canada, September 2007. ACM Press, New York (2007)"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Peterson, J.: A privacy mechanism for the session initiation protocol (SIP). RFC 3323, IETF (November 2002)","DOI":"10.17487\/rfc3323"},{"key":"11_CR35","unstructured":"Piper, D., Swander, B.: A GSS-API authentication method for IKE. Internet-Draft draft-ietf-ipsec-isakmp-gss-auth-07, IETF, Expired (July 2001)"},{"issue":"1","key":"11_CR36","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"11_CR37","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"11_CR38","unstructured":"Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: Privacy trends in consumer ubiquitous computing. In: Proceedings of 16th USENIX Security Symposium, Boston, MA, USA, August 2007. USENIX Association (2007)"},{"key":"11_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482. Springer, Heidelberg (2003)"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Simon, D., Aboba, B., Hurst, R.: The EAP-TLS authentication protocol. RFC 5216, IETF (March 2008)","DOI":"10.17487\/rfc5216"},{"key":"11_CR41","first-page":"44","volume-title":"Proc. 1997 IEEE Symposium on Security and Privacy","author":"P.F. Syverson","year":"1997","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: Proc. 1997 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 44\u201354. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"5","key":"11_CR42","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: a model for protecting privacy. International Journal on Uncertainty. Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty. Fuzziness and Knowledge-based Systems"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T.: IPv6 stateless address autoconfiguration. RFC 2462, IETF (December 1998)","DOI":"10.17487\/rfc2462"},{"key":"11_CR44","unstructured":"Yumerefendi, A.R., Mickle, B., Cox, L.P.: TightLip: Keeping applications from spilling the beans. In: Proceedings of 4th USENIX Symposium on Networked Systems Design & Implementation, Cambridge, MA, USA, April 2007, pp. 159\u2013172. USENIX Association (2007)"},{"key":"11_CR45","unstructured":"Zhao, Q., Cheng, W.W., Yu, B., Hiroshige, S.: DOG: Efficient information flow tracing and program monitoring with dynamic binary rewriting. Technical report, MIT (2005)"},{"key":"11_CR46","unstructured":"Zugenmaier, A.: Anonymity for Users of Mobile Devices through Location Addressing. PhD thesis, University of Freiburg, Freiburg, Germany (2003)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70630-4_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:26:25Z","timestamp":1620015985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70630-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540706298","9783540706304"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70630-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}