{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:13Z","timestamp":1763468173248,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257007"],"award-info":[{"award-number":["257007"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523653","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"19-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["The man who\n            <i>was<\/i>\n            there"],"prefix":"10.1145","author":[{"given":"Iasonas","family":"Polakis","sequence":"first","affiliation":[{"name":"FORTH-ICS, Greece"}]},{"given":"Stamatis","family":"Volanis","sequence":"additional","affiliation":[{"name":"FORTH-ICS, Greece"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"FORTH-ICS, Greece"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1\n   .5 million facebook accounts offered for sale. http:\/\/www.zdnet.com\/blog\/security\/1-5-million-facebook-accounts-offered-for-sale-faq\/6304.  1.5 million facebook accounts offered for sale. http:\/\/www.zdnet.com\/blog\/security\/1-5-million-facebook-accounts-offered-for-sale-faq\/6304."},{"key":"e_1_3_2_1_2_1","unstructured":"American Express discounts in FourSquare. https:\/\/sync.americanexpress.com\/foursquare\/.  American Express discounts in FourSquare. https:\/\/sync.americanexpress.com\/foursquare\/."},{"key":"e_1_3_2_1_3_1","first-page":"2","volume-title":"Enable real nfc","author":"Android","unstructured":"Android issues : Enable real nfc p 2 p communication. http:\/\/code.google.com\/p\/android\/issues\/detail?id=28014. Android issues: Enable real nfc p2p communication. http:\/\/code.google.com\/p\/android\/issues\/detail?id=28014."},{"key":"e_1_3_2_1_4_1","unstructured":"Facebook developers - bugs. https:\/\/developers.facebook.com\/bugs\/244713388933143?browse=search_4f12b26febf840e00208758.  Facebook developers - bugs. https:\/\/developers.facebook.com\/bugs\/244713388933143?browse=search_4f12b26febf840e00208758."},{"key":"e_1_3_2_1_5_1","unstructured":"Foursquare - follow-up to \"mayorships from your couch\" post. http:\/\/blog.foursquare.com\/2010\/04\/08\/505862083\/.  Foursquare - follow-up to \"mayorships from your couch\" post. http:\/\/blog.foursquare.com\/2010\/04\/08\/505862083\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Foursquare adds nfc support to its android app. http:\/\/techcrunch.com\/2012\/02\/10\/foursquare-adds-nfc-support-to-its-android-app\/.  Foursquare adds nfc support to its android app. http:\/\/techcrunch.com\/2012\/02\/10\/foursquare-adds-nfc-support-to-its-android-app\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Foursquare CEO: 'Not just check-ins and badges.'. http:\/\/money.cnn.com\/2012\/02\/29\/technology\/foursquare_ceo\/.  Foursquare CEO: 'Not just check-ins and badges.'. http:\/\/money.cnn.com\/2012\/02\/29\/technology\/foursquare_ceo\/."},{"key":"e_1_3_2_1_8_1","unstructured":"How does foursquare handle cheating? http:\/\/support.foursquare.com\/entries\/188307.  How does foursquare handle cheating? http:\/\/support.foursquare.com\/entries\/188307."},{"key":"e_1_3_2_1_9_1","unstructured":"Mayor of the north pole. http:\/\/krazydad.com\/blog\/2010\/02\/15\/mayor-of-the-north-pole\/.  Mayor of the north pole. http:\/\/krazydad.com\/blog\/2010\/02\/15\/mayor-of-the-north-pole\/."},{"key":"e_1_3_2_1_10_1","unstructured":"On foursquare cheating and claiming mayorships from your couch. http:\/\/blog.foursquare.com\/2010\/04\/07\/503822143\/.  On foursquare cheating and claiming mayorships from your couch. http:\/\/blog.foursquare.com\/2010\/04\/07\/503822143\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Rsa performance of sun fire t2000. http:\/\/blogs.sun.com\/chichang1\/entry\/rsa_performance_of_sun_fire.  Rsa performance of sun fire t2000. http:\/\/blogs.sun.com\/chichang1\/entry\/rsa_performance_of_sun_fire."},{"key":"e_1_3_2_1_12_1","unstructured":"Russian underground. http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-russian-underground-101.pdf.  Russian underground. http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-russian-underground-101.pdf."},{"key":"e_1_3_2_1_13_1","volume-title":"Practical considerations and implementation experiences in securing smart object networks","author":"Arkko J.","year":"2012","unstructured":"Arkko , J. , Keranen , A. , and Sethi , M . Practical considerations and implementation experiences in securing smart object networks , 2012 . http:\/\/tools.ietf.org\/html\/draft-aks-crypto-sensors-00. Arkko, J., Keranen, A., and Sethi, M. Practical considerations and implementation experiences in securing smart object networks, 2012. http:\/\/tools.ietf.org\/html\/draft-aks-crypto-sensors-00."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929855"},{"key":"e_1_3_2_1_15_1","volume-title":"Hit, link, like and share. Organizing the social and the fabric of the web in a like economy. Presented at the DMI mini-conference","author":"Gerlitz A.","year":"2011","unstructured":"C. Gerlitz and A. Helmon . Hit, link, like and share. Organizing the social and the fabric of the web in a like economy. Presented at the DMI mini-conference , volume 24 , 2011 . C. Gerlitz and A. Helmon. Hit, link, like and share. Organizing the social and the fabric of the web in a like economy. Presented at the DMI mini-conference, volume 24, 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2012.6502516"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_26"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of ACM CHI Workshop on Gamification","author":"Cramer H.","year":"2011","unstructured":"Cramer , H. Gamification and location-sharing: emerging social conflicts . Proceedings of ACM CHI Workshop on Gamification ( 2011 ). Cramer, H. Gamification and location-sharing: emerging social conflicts. Proceedings of ACM CHI Workshop on Gamification (2011)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037384"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.42"},{"key":"e_1_3_2_1_23_1","volume-title":"INFOCOM","author":"Hu Y.-C.","year":"2003","unstructured":"Hu , Y.-C. , Perrig , A. , and Johnson , D. B . Packet leashes: A defense against wormhole attacks in wireless networks . In INFOCOM ( 2003 ). Hu, Y.-C., Perrig, A., and Johnson, D. B. Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM (2003)."},{"volume-title":"Proceedings of the 8th USENIX conference on Networked systems design and implementation, NSDI'11","author":"Jang K.","key":"e_1_3_2_1_24_1","unstructured":"Jang , K. , Han , S. , Han , S. , Moon , S. , and Park , K . Sslshader: cheap ssl acceleration with commodity processors . In Proceedings of the 8th USENIX conference on Networked systems design and implementation, NSDI'11 . Jang, K., Han, S., Han, S., Moon, S., and Park, K. Sslshader: cheap ssl acceleration with commodity processors. In Proceedings of the 8th USENIX conference on Networked systems design and implementation, NSDI'11."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851200"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979295"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869797"},{"key":"e_1_3_2_1_28_1","volume-title":"NDSS","author":"Narayanan A.","year":"2011","unstructured":"Narayanan , A. , Thiagarajan , N. , Lakhani , M. , Hamburg , M. , and Boneh , D . Location privacy via private proximity testing . In NDSS ( 2011 ). Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., and Boneh, D. Location privacy via private proximity testing. In NDSS (2011)."},{"key":"e_1_3_2_1_29_1","volume-title":"ICWSM","author":"Noulas A.","year":"2011","unstructured":"Noulas , A. , Scellato , S. , Mascolo , C. , and Pontil , M . An empirical study of geographic user activity patterns in foursquare . In ICWSM ( 2011 ). Noulas, A., Scellato, S., Mascolo, C., and Pontil, M. An empirical study of geographic user activity patterns in foursquare. In ICWSM (2011)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335363"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929854"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514414"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734593"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523653"}},"subtitle":["validating check-ins in location-based services"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":35,"alternative-id":["10.1145\/2523649.2523653","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523653","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}