{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T22:24:31Z","timestamp":1751927071694,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft (DFG) - SFB 1119","doi-asserted-by":"publisher","award":["236615297"],"award-info":[{"award-number":["236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/trustcom50675.2020.00069","type":"proceedings-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T04:33:34Z","timestamp":1618374814000},"page":"458-467","source":"Crossref","is-referenced-by-count":43,"title":["Mind the GAP: Security &amp; Privacy Risks of Contact Tracing Apps"],"prefix":"10.1109","author":[{"given":"Lars","family":"Baumgartner","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[{"name":"Julius-Maximilians-Universit\u00e4t,W\u00fcrzburg,Germany"}]},{"given":"Bernd","family":"Freisleben","sequence":"additional","affiliation":[{"name":"Philipps-Universit\u00e4t,Germany"}]},{"given":"Alexander","family":"Gruler","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Jonas","family":"Hochst","sequence":"additional","affiliation":[{"name":"Philipps-Universit\u00e4t,Germany"}]},{"given":"Joshua","family":"Kuhlberg","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Richard","family":"Mitev","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Anel","family":"Muhamedagic","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Thien Duc","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Alvar","family":"Penning","sequence":"additional","affiliation":[{"name":"Philipps-Universit\u00e4t,Germany"}]},{"given":"Dermot","family":"Pustelnik","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Filipp","family":"Roos","sequence":"additional","affiliation":[{"name":"Julius-Maximilians-Universit\u00e4t,W\u00fcrzburg,Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t,Darmstadt,Germany"}]},{"given":"Michael","family":"Schwarz","sequence":"additional","affiliation":[{"name":"Philipps-Universit\u00e4t,Germany"}]},{"given":"Christian","family":"Uhl","sequence":"additional","affiliation":[{"name":"Philipps-Universit\u00e4t,Germany"}]}],"member":"263","reference":[{"journal-title":"CovidSafe Contact Tracing App","year":"0","key":"ref10"},{"journal-title":"Doc-umentation for Pan-European Privacy-Preserving Proximity Tracing (PEPP-PT)","year":"0","key":"ref11"},{"journal-title":"StopCovid France","year":"0","key":"ref12"},{"journal-title":"Exposure Notification Cryptography Specification v1 2","year":"2020","key":"ref13"},{"journal-title":"PACT Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing","year":"2020","author":"chan","key":"ref14"},{"key":"ref15","article-title":"Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc","author":"gvili","year":"2020","journal-title":"Cryptology ePrint Archive Report 2020\/428"},{"journal-title":"Mobile applications to support contact tracing in the EU's fight against COVID-19","year":"2020","key":"ref16"},{"key":"ref17","article-title":"Analysis of DP-3T","author":"vaudenay","year":"2020","journal-title":"Cryptology ePrint Archive Report 2020\/399"},{"key":"ref18","article-title":"Centralized or Decentralized? The Contact Tracing Dilemma","author":"vaudenay","year":"2020","journal-title":"Cryptology ePrint Archive Report 2020\/531"},{"key":"ref19","article-title":"Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing","author":"pietrzak","year":"2020","journal-title":"Cryptology ePrint Archive Report 2020\/418"},{"journal-title":"Bluetooth Core Specification 5 2","year":"0","key":"ref28"},{"journal-title":"Aarogya Setu Mobile App","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC46280.2020.9342928"},{"journal-title":"Apps Gone Rogue Maintaining Personal Privacy in an Epidemic","year":"0","author":"raskar","key":"ref3"},{"key":"ref6","article-title":"Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection","volume":"abs 2006 6822","author":"leith","year":"2020","journal-title":"CoRR"},{"journal-title":"Exposure Notification Bluetooth Specification v1 2","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0219890"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0239943"},{"key":"ref7","article-title":"Measurement-Based Evaluation Of Google\/Apple Exposure Notification API For Proximity Detection in a Commuter Bus","volume":"abs 2006 8543","author":"leith","year":"2020","journal-title":"CoRR"},{"journal-title":"Com-parison of Tracing Approaches","year":"0","author":"miettinen","key":"ref2"},{"journal-title":"TraceTogether Contact Tracing App","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(20)30184-9"},{"key":"ref20","first-page":"303","article-title":"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization","author":"ji","year":"2015","journal-title":"24th USENIX Security symposium"},{"journal-title":"Exposure Notification Addendum","year":"0","key":"ref22"},{"key":"ref21","article-title":"Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy","volume":"abs 1803 9007","author":"radaelli","year":"2018","journal-title":"CoRR"},{"journal-title":"Data Protection and Security Architecture Illustrated on the German Implementation","year":"2020","key":"ref24"},{"journal-title":"Security and Privacy Analysis of the Document &#x201C;PEPP-PT Data Protection and Information Security Architecture","year":"2020","key":"ref23"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","article-title":"Wormhole Attacks in Wireless Networks","volume":"24","author":"hu","year":"2006","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"ref25","article-title":"ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy","author":"beskorovajnov","year":"2020","journal-title":"Cryptology ePrint Archive Report 2020\/505"}],"event":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2020,12,29]]},"location":"Guangzhou, China","end":{"date-parts":[[2021,1,1]]}},"container-title":["2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9342897\/9342964\/09342982.pdf?arnumber=9342982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:20:09Z","timestamp":1657333209000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9342982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/trustcom50675.2020.00069","relation":{},"subject":[],"published":{"date-parts":[[2020,12]]}}}