{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:43:53Z","timestamp":1730288633185,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/percom.2018.8444603","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T18:07:15Z","timestamp":1535047635000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["Bellrock: Anonymous Proximity Beacons From Personal Devices"],"prefix":"10.1109","author":[{"given":"Augustin","family":"Zidek","sequence":"first","affiliation":[]},{"given":"Shyam","family":"Tailor","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Harle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2430281"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2552981"},{"journal-title":"Android battery historian","year":"2018","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917855"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313476"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AIMS.2014.58"},{"key":"ref15","article-title":"From &#x201C;Where I Am&#x201D; to &#x201C;Here I Am&#x201D;: accuracy study on location-based services with IBeacon Technology","volume":"22","author":"ming ng","year":"2015","journal-title":"HKIE Trans"},{"journal-title":"Building Applications with iBeacon Proximity and Location Services with Bluetooth Low Energy","year":"2014","author":"gast","key":"ref16"},{"journal-title":"Estimote","year":"2018","key":"ref17"},{"journal-title":"Google eddystone","year":"0","key":"ref18"},{"key":"ref19","first-page":"5:1","article-title":"Devices that tell on you: Privacy trends in consumer ubiquitous computing","author":"saponas","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium SS&#x2019;07"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938995"},{"key":"ref4","first-page":"149","author":"juels","year":"2005","journal-title":"Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916662"},{"key":"ref3","first-page":"1","volume":"4","author":"shi","year":"2016","journal-title":"The vulnerability analysis of some typical hash-based rfid authentication protocols"},{"key":"ref6","first-page":"201","author":"weis","year":"2004","journal-title":"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1458287"},{"key":"ref5","article-title":"Ephemeral identifiers: Mitigating tracking & spoofing threats to ble beacons","author":"hassidim","year":"2016","journal-title":"Google Tech Rep"},{"key":"ref8","article-title":"Bluetooth specification version 4.2","author":"bluetooth","year":"2014","journal-title":"Bluetooth SIG"},{"journal-title":"OpenCell","year":"2018","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.913918"},{"key":"ref9","article-title":"Intel AVX: New frontiers in performance improvements and energy efficiency","author":"firasta","year":"2008","journal-title":"Intel White Paper"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref20","article-title":"Location privacy in bluetooth","volume":"3813","author":"fl","year":"2005","journal-title":"Security and Privacy in Ad-hoc and Sensor Networks ESAS 2005 Lecture Notes in Computer Science"},{"journal-title":"Estimote Secure UUID","year":"2018","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2013.89"},{"journal-title":"TrackR","year":"2018","key":"ref24"},{"journal-title":"Tile","year":"2018","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081345"}],"event":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2018,3,19]]},"location":"Athens","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8428394\/8444570\/08444603.pdf?arnumber=8444603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T22:45:04Z","timestamp":1561070704000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8444603\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/percom.2018.8444603","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}