{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:22:17Z","timestamp":1759134137791,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,13]],"date-time":"2007-06-13T00:00:00Z","timestamp":1181692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,13]]},"DOI":"10.1145\/1247660.1247688","type":"proceedings-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T16:07:37Z","timestamp":1189786057000},"page":"233-245","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["SmokeScreen"],"prefix":"10.1145","author":[{"given":"Landon P.","family":"Cox","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Angela","family":"Dalton","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Varun","family":"Marupadi","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2007,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.978003"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587125"},{"key":"e_1_3_2_1_4_1","unstructured":"Cnn.com--MySpace's the place online February 2006.  Cnn.com--MySpace's the place online February 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"P. Chown. Advanced encryption standard (MD5) ciphersuites for transport layer security (TLS). Internet RFC 3268 June 2002.   P. Chown. Advanced encryption standard (MD5) ciphersuites for transport layer security (TLS). Internet RFC 3268 June 2002.","DOI":"10.17487\/rfc3268"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/WMCSA.2006.21"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056910"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.37"},{"key":"e_1_3_2_1_11_1","unstructured":"facebook. http:\/\/www.facebook.com\/.  facebook. http:\/\/www.facebook.com\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Google Desktop. http:\/\/desktop.google.com.  Google Desktop. http:\/\/desktop.google.com."},{"volume-title":"Proceedings of the 3rd Symposium on Networked Systems Design and Implementation","year":"2006","author":"Garriss S.","key":"e_1_3_2_1_14_1"},{"first-page":"481","volume-title":"Operating Systems: An Advanced Course","author":"Gray J.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-6425-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.42"},{"volume-title":"Ablex","year":"1989","author":"Kochen M.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_8"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"e_1_3_2_1_25_1","unstructured":"macchanger. http:\/\/www.alobbs.com\/macchanger\/.  macchanger. http:\/\/www.alobbs.com\/macchanger\/."},{"key":"e_1_3_2_1_26_1","unstructured":"myspace. http:\/\/www.myspace.com\/.  myspace. http:\/\/www.myspace.com\/."},{"volume-title":"Ethnographic Praxis in Industry Conference","year":"2005","author":"March W.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.422.0205"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186726"},{"volume-title":"Adjunct Proceedings of the 7th International Conference on Ubiquitous Computing","year":"2005","author":"Nair R.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"National Institute of Standards and Technology. Digital Signature Standard (DSS). FIPS Publication #186--2 January 2000.  National Institute of Standards and Technology. Digital Signature Standard (DSS). FIPS Publication #186--2 January 2000."},{"key":"e_1_3_2_1_32_1","unstructured":"National Institute of Standards and Technology. Secure hash standard. FIPS Publication #180--1 April 1997.  National Institute of Standards and Technology. Secure hash standard. FIPS Publication #180--1 April 1997."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30119-6_18"},{"key":"e_1_3_2_1_35_1","unstructured":"Personal Distributed Information Store. http:\/\/pdis.hiit.fi\/pdis\/.  Personal Distributed Information Store. http:\/\/pdis.hiit.fi\/pdis\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"R. Rivest. The MD5 message--digest algorithm. Internet RFC 1321 April 1992.  R. Rivest. The MD5 message--digest algorithm. Internet RFC 1321 April 1992.","DOI":"10.17487\/rfc1321"},{"key":"e_1_3_2_1_37_1","unstructured":"Spotlight for Mac OS X. http:\/\/apple.com.  Spotlight for Mac OS X. http:\/\/apple.com."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990072"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095822"}],"event":{"name":"Mobisys07: The Fifth International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"San Juan Puerto Rico","acronym":"Mobisys07"},"container-title":["Proceedings of the 5th international conference on Mobile systems, applications and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247660.1247688","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1247660.1247688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:39Z","timestamp":1750258059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247660.1247688"}},"subtitle":["flexible privacy controls for presence-sharing"],"short-title":[],"issued":{"date-parts":[[2007,6,13]]},"references-count":39,"alternative-id":["10.1145\/1247660.1247688","10.1145\/1247660"],"URL":"https:\/\/doi.org\/10.1145\/1247660.1247688","relation":{},"subject":[],"published":{"date-parts":[[2007,6,13]]},"assertion":[{"value":"2007-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}