{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:22Z","timestamp":1761611362414},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/cns.2014.6997512","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T04:15:04Z","timestamp":1419999304000},"source":"Crossref","is-referenced-by-count":3,"title":["LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks"],"prefix":"10.1109","author":[{"given":"Yu Seung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Le T.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Tague","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504742"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263700"},{"key":"18","article-title":"Linking wireless devices using information contained in wi-fi probe requests","author":"cunche","year":"2013","journal-title":"Pervasive and Mobile Computing"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866318"},{"key":"13","author":"liu","year":"2011","journal-title":"Mimicry Attacks Against Wireless Link Signature and Defense Using Time-synched Link Signature"},{"key":"14","article-title":"Can ferris bueller still have his day off? Protecting privacy in the wireless era","author":"greenstein","year":"2007","journal-title":"Proceedings of 11th Workshop on Hot Topics in Operating Systems (HotOS XI)"},{"key":"11","year":"0"},{"key":"12","year":"0"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378607"},{"key":"3","year":"2012","journal-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247689"},{"key":"2","year":"0","journal-title":"Cisco Mobility Service Engine"},{"key":"1","year":"0","journal-title":"Skyhook"},{"key":"10","year":"0"},{"key":"7","first-page":"167","article-title":"Passive data link layer 802.11 wireless device driver fingerprinting","author":"franklin","year":"2006","journal-title":"Proc 15th USENIX Security Symposium"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352542"},{"key":"5","year":"0","journal-title":"Karma Attack"},{"key":"4","year":"0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514293"}],"event":{"name":"2014 IEEE Conference on Communications and Network Security (CNS)","location":"San Francisco, CA, USA","start":{"date-parts":[[2014,10,29]]},"end":{"date-parts":[[2014,10,31]]}},"container-title":["2014 IEEE Conference on Communications and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982337\/6997445\/06997512.pdf?arnumber=6997512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:22:11Z","timestamp":1602688931000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6997512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cns.2014.6997512","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}