{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T06:51:14Z","timestamp":1774248674735,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/wowmom.2012.6263700","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T20:06:16Z","timestamp":1345147576000},"page":"1-9","source":"Crossref","is-referenced-by-count":54,"title":["I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests"],"prefix":"10.1109","author":[{"given":"Mathieu","family":"Cunche","sequence":"first","affiliation":[]},{"family":"Mohamed Ali Kaafar","sequence":"additional","affiliation":[]},{"given":"Roksana","family":"Boreli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998425"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639766"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1870015"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352542"},{"key":"2","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","article-title":"Friends and Neighbors on the Web","volume":"25","author":"adamic","year":"2001","journal-title":"Social Networks"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571720"},{"key":"6","article-title":"Can Ferris Bueller still have his day off? Protecting privacy in the wireless era","author":"greenstein","year":"2007","journal-title":"Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems"},{"key":"5","article-title":"Passive data link layer 802.11 wireless device driver fingerprinting","volume":"15","author":"franklin","year":"2006","journal-title":"Proceedings of the 15th conference on USENIX Security Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"9","article-title":"Tryst: The Case for Confidential Service Discovery","author":"pang","year":"0","journal-title":"Proceedings of HotNets Atlanta GA November 2007"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514293"}],"event":{"name":"2012 IEEE Thirteenth International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","location":"San Francisco, CA, USA","start":{"date-parts":[[2012,6,25]]},"end":{"date-parts":[[2012,6,28]]}},"container-title":["2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6253016\/6263669\/06263700.pdf?arnumber=6263700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T22:56:36Z","timestamp":1497999396000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6263700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2012.6263700","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}