{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:00:03Z","timestamp":1742378403614,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,28]]},"DOI":"10.1145\/1161289.1161292","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"11-18","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Location privacy in wireless personal area networks"],"prefix":"10.1145","author":[{"given":"Dave","family":"Singel\u00e9e","sequence":"first","affiliation":[{"name":"Katholieke Universiteit Leuven, Heverlee, Belgium"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"Katholieke Universiteit Leuven, Heverlee, Belgium"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS '02)","author":"Balfanz D.","year":"2002","unstructured":"D. Balfanz , D. Smetters , P. Stewart , and H. Wong . Talking to Strangers: Authentication in Adhoc Wireless Networks . In Proceedings of the Network and Distributed System Security Symposium (NDSS '02) . The Internet Society , 2002 .]] D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to Strangers: Authentication in Adhoc Wireless Networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS '02). The Internet Society, 2002.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"Bluetags Corporation. http:\/\/www.bluetags.com.]]  Bluetags Corporation. http:\/\/www.bluetags.com.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"Bluetooth Special Interest Group. http:\/\/www.bluetooth.com\/.]]  Bluetooth Special Interest Group. http:\/\/www.bluetooth.com\/.]]"},{"key":"e_1_3_2_1_4_1","unstructured":"Bluetooth Specification. https:\/\/www.bluetooth.org\/spec\/.]]  Bluetooth Specification. https:\/\/www.bluetooth.org\/spec\/.]]"},{"key":"e_1_3_2_1_5_1","volume-title":"The Bluesniper Rifle","author":"Cheung H.","year":"2004","unstructured":"H. Cheung . The Bluesniper Rifle , 2004 . http:\/\/www.tomsnetworking.com\/Sections-article106.php.]] H. Cheung. The Bluesniper Rifle, 2004. http:\/\/www.tomsnetworking.com\/Sections-article106.php.]]"},{"volume-title":"CON. Computer Underground Hackers Convention. http:\/\/www.defcon.org.]]","author":"DEF","key":"e_1_3_2_1_6_1","unstructured":"DEF CON. Computer Underground Hackers Convention. http:\/\/www.defcon.org.]] DEF CON. Computer Underground Hackers Convention. http:\/\/www.defcon.org.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/941326.941334"},{"key":"e_1_3_2_1_9_1","first-page":"38","volume-title":"Goals and Architecture. In ACM Mobile Computing and Communications Review","author":"Haartsen J.","year":"1998","unstructured":"J. Haartsen , M. Naghshineh , J. Inouye , O. Joeressen , and W. Allen . Bluetooth: Visions , Goals and Architecture. In ACM Mobile Computing and Communications Review , pages 38 -- 45 , 1998 .]] J. Haartsen, M. Naghshineh, J. Inouye, O. Joeressen, and W. Allen. Bluetooth: Visions, Goals and Architecture. In ACM Mobile Computing and Communications Review, pages 38--45, 1998.]]"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science, LNCS 3110","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/978-3-540-27809-2_22","volume-title":"Financial Cryptography","author":"Hoepman J. H.","year":"2004","unstructured":"J. H. Hoepman . The Ephemeral Pairing Problem . In Financial Cryptography , Lecture Notes in Computer Science, LNCS 3110 , pages 212 -- 226 . Springer-Verlag , 2004 .]] J. H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Lecture Notes in Computer Science, LNCS 3110, pages 212--226. Springer-Verlag, 2004.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_12"},{"key":"e_1_3_2_1_12_1","unstructured":"IEEE 802.15 the Wireless Personal Area Network Working Group. http:\/\/www.ieee802.org\/15\/.]]  IEEE 802.15 the Wireless Personal Area Network Working Group. http:\/\/www.ieee802.org\/15\/.]]"},{"key":"e_1_3_2_1_13_1","unstructured":"Infrared Data Association. http:\/\/www.irda.org\/.]]  Infrared Data Association. http:\/\/www.irda.org\/.]]"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science, LNCS","first-page":"176","volume-title":"Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01)","author":"Jakobsson M.","year":"2020","unstructured":"M. Jakobsson and S. Wetzel . Security Weaknesses in Bluetooth . In Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01) , Lecture Notes in Computer Science, LNCS 2020 , pages 176 -- 191 . Springer-Verlag , 2001.]] M. Jakobsson and S. Wetzel. Security Weaknesses in Bluetooth. In Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '01), Lecture Notes in Computer Science, LNCS 2020, pages 176--191. Springer-Verlag, 2001.]]"},{"key":"e_1_3_2_1_15_1","unstructured":"Loca Project. http:\/\/www.loca-lab.org.]]  Loca Project. http:\/\/www.loca-lab.org.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99)","author":"Lysyanskaya A.","year":"1999","unstructured":"A. Lysyanskaya , R. Rivest , A. Sahai , and S. Wolf . Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99) , Lecture Notes in Computer Science, LNCS 1758, pages 184--199. Springer-Verlag , 1999 .]] A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Proceedings of the 6th Annual International Workshop of Selected Areas in Cryptography (SAC '99), Lecture Notes in Computer Science, LNCS 1758, pages 184--199. Springer-Verlag, 1999.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/561322"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_19_1","unstructured":"New European Schemes for Signatures Integrity and Encryption. http:\/\/www.cryptonessie.org.]]  New European Schemes for Signatures Integrity and Encryption. http:\/\/www.cryptonessie.org.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/871506.871518"},{"key":"e_1_3_2_1_21_1","series-title":"Lecture Notes in Computer Science, LNCS 196","first-page":"47","volume-title":"Advances in Cryptology CRYPTO '84","author":"Shamir A.","year":"1984","unstructured":"A. Shamir . Identity-Based Cryptosystems and Signature Schemes . In Advances in Cryptology CRYPTO '84 , Lecture Notes in Computer Science, LNCS 196 , pages 47 -- 53 . Springer-Verlag , 1984 .]] A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology CRYPTO '84, Lecture Notes in Computer Science, LNCS 196, pages 47--53. Springer-Verlag, 1984.]]"},{"volume-title":"Improved Pairing Protocol for Bluetooth. To Appear in the Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06)","author":"Singel\u00e9e D.","key":"e_1_3_2_1_22_1","unstructured":"D. Singel\u00e9e and B. Preneel . Improved Pairing Protocol for Bluetooth. To Appear in the Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06) .]] D. Singel\u00e9e and B. Preneel. Improved Pairing Protocol for Bluetooth. To Appear in the Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW '06).]]"},{"issue":"2","key":"e_1_3_2_1_23_1","first-page":"45","volume":"11","author":"Singel\u00e9e D.","year":"2006","unstructured":"D. Singel\u00e9e and B. Preneel . Review of the Bluetooth Security Architecture. Information Security Bulletin , 11 ( 2 ): 45 -- 53 , 2006 .]] D. Singel\u00e9e and B. Preneel. Review of the Bluetooth Security Architecture. Information Security Bulletin, 11(2):45--53, 2006.]]","journal-title":"Review of the Bluetooth Security Architecture. Information Security Bulletin"},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science, LNCS 1796","first-page":"172","volume-title":"Proceedings of the 7th International Workshop on Security Protocols","author":"Stajano F.","year":"1999","unstructured":"F. Stajano and R. Anderson . The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks . In Proceedings of the 7th International Workshop on Security Protocols , Lecture Notes in Computer Science, LNCS 1796 , pages 172 -- 182 . Springer-Verlag , 1999 .]] F. Stajano and R. Anderson. The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, LNCS 1796, pages 172--182. Springer-Verlag, 1999.]]"},{"key":"e_1_3_2_1_25_1","unstructured":"The WI-FI alliance. http:\/\/www.wi-fi.org\/.]]  The WI-FI alliance. http:\/\/www.wi-fi.org\/.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_15"}],"event":{"name":"DIWANS06: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks 2006","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Los Angeles California","acronym":"DIWANS06"},"container-title":["Proceedings of the 5th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161289.1161292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T19:15:52Z","timestamp":1673205352000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161289.1161292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,28]]},"references-count":26,"alternative-id":["10.1145\/1161289.1161292","10.1145\/1161289"],"URL":"https:\/\/doi.org\/10.1145\/1161289.1161292","relation":{},"subject":[],"published":{"date-parts":[[2006,9,28]]},"assertion":[{"value":"2006-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}