{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:07:39Z","timestamp":1725638859828},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642258206"},{"type":"electronic","value":"9783642258213"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25821-3_3","type":"book-chapter","created":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T06:09:36Z","timestamp":1323065376000},"page":"41-60","source":"Crossref","is-referenced-by-count":15,"title":["Contrail: Enabling Decentralized Social Networks on Smartphones"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Stuedi","sequence":"first","affiliation":[]},{"given":"Iqbal","family":"Mohomed","sequence":"additional","affiliation":[]},{"given":"Mahesh","family":"Balakrishnan","sequence":"additional","affiliation":[]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Venugopalan","family":"Ramasubramanian","sequence":"additional","affiliation":[]},{"given":"Doug","family":"Terry","sequence":"additional","affiliation":[]},{"given":"Ted","family":"Wobber","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Diaspora, http:\/\/www.joindiaspora.com"},{"key":"3_CR2","unstructured":"Monsoon power monitor, https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor"},{"key":"3_CR3","unstructured":"Privacy-aware and highly-available osn profiles. In: 6th International Workshop on Collaborative Peer-to-Peer Systems (COPS 2010) (2010)"},{"key":"3_CR4","volume-title":"PODC 1999: Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing","author":"M.K. Aguilera","year":"1999","unstructured":"Aguilera, M.K., Strom, R.E., Sturman, D.C., Astley, M., Chandra, T.D.: Matching events in a content-based subscription system. In: PODC 1999: Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing. ACM, New York (1999)"},{"key":"3_CR5","unstructured":"Ballani, H., Chawathe, Y., Ratnasamy, S., Roscoe, T., Shenker, S.: Off by default. In: Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV), Citeseer (2005)"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"C\u00e1ceres, R., Cox, L., Lim, H., Shakimov, A., Varshavsky, A.: Virtual individual servers as privacy-preserving proxies for mobile devices. In: Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, pp. 37\u201342. ACM (2009)","DOI":"10.1145\/1592606.1592616"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"P.T. Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish\/subscribe. ACM Comput. Surv.\u00a035(2), 114\u2013131 (2003)","journal-title":"ACM Comput. Surv."},{"key":"3_CR9","unstructured":"Ford, B., Strauss, J., Lesniewski, C., Rhea, S., Kaashoek, F., Morris, R.: Persistent Personal Names for Globally Connected Mobile Devices"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/1555816.1555827","volume-title":"MobiSys 2009: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services","author":"D. Li","year":"2009","unstructured":"Li, D., Anand, M.: Majab: improving resource management for web-based applications on mobile devices. In: MobiSys 2009: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, pp. 95\u2013108. ACM, New York (2009)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1592665.1592678","volume-title":"WOSN 2009: Proceedings of the 2nd ACM Workshop on Online Social Networks","author":"A.-K. Pietil\u00e4inen","year":"2009","unstructured":"Pietil\u00e4inen, A.-K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: WOSN 2009: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 49\u201354. ACM, New York (2009)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Qureshi, A., Guttag, J.V.: Horde: separating network striping policy from mechanism. In: MobiSys, pp. 121\u2013134 (2005)","DOI":"10.1145\/1067170.1067184"},{"key":"3_CR13","first-page":"261","volume-title":"NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation","author":"V. Ramasubramanian","year":"2009","unstructured":"Ramasubramanian, V., Rodeheffer, T.L., Terry, D.B., Walraed-Sullivan, M., Wobber, T., Marshall, C.C., Vahdat, A.: Cimbiosys: a platform for content-based partial replication. In: NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 261\u2013276. USENIX Association, Berkeley (2009)"},{"issue":"6","key":"3_CR14","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N. Sadeh","year":"2009","unstructured":"Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people privacy policies in a mobile social networking application. Personal and Ubiquitous Computing\u00a013(6), 401\u2013412 (2009)","journal-title":"Personal and Ubiquitous Computing"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1145\/570645.570666","volume-title":"Proceedings of the 8th Annual International Conference on Mobile Computing and Networking","author":"E. Shih","year":"2002","unstructured":"Shih, E., Bahl, P., Sinclair, M.: Wake on wireless: An event driven energy saving strategy for battery operated devices. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 160\u2013171. ACM, New York (2002)"},{"key":"3_CR16","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000 (2000)"},{"key":"3_CR17","volume-title":"Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services","author":"J. Sorber","year":"2005","unstructured":"Sorber, J., Banerjee, N., Corner, M., Rollins, S.: Turducken: Hierarchical power management for mobile devices. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM, New York (2005)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-540-74853-3_23","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"J. Su","year":"2007","unstructured":"Su, J., Scott, J., Hui, P., Crowcroft, J., De Lara, E., Diot, C., Goel, A., Lim, M., Upton, E.: Haggle: Seamless Networking for Mobile Applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol.\u00a04717, pp. 391\u2013408. Springer, Heidelberg (2007)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, H., DeCleene, B., Kurose, J., Towsley, D.: Bootstrapping Deny-By-Default Access Control For Mobile Ad-Hoc Networks. In: IEEE Military Communications Conference (MILCOM) 2008, San Diego, November 17-19 (2008)","DOI":"10.1109\/MILCOM.2008.4753174"}],"container-title":["Lecture Notes in Computer Science","Middleware 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25821-3_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:58:33Z","timestamp":1606186713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25821-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642258206","9783642258213"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25821-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}