{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T10:24:14Z","timestamp":1762338254619,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,11]],"date-time":"2014-06-11T00:00:00Z","timestamp":1402444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,11]]},"DOI":"10.1145\/2611264.2611266","type":"proceedings-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T12:42:40Z","timestamp":1403008960000},"page":"39-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Analysing the privacy policies of Wi-Fi trackers"],"prefix":"10.1145","author":[{"given":"Levent","family":"Demir","sequence":"first","affiliation":[{"name":"Inria, Grenoble, France"}]},{"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[{"name":"University of Lyon, Lyon, France"}]},{"given":"C\u00e9dric","family":"Lauradoux","sequence":"additional","affiliation":[{"name":"Inria, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aislelabs - Privacy. http:\/\/www.aislelabs.com\/privacy\/.  Aislelabs - Privacy. http:\/\/www.aislelabs.com\/privacy\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Brickstream - Privacy Matters. http:\/\/brickstream.com\/live\/privacy-matters\/.  Brickstream - Privacy Matters. http:\/\/brickstream.com\/live\/privacy-matters\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Euclid Analytics - Privacy Statement. http:\/\/euclidanalytics.com\/privacy\/statement\/.  Euclid Analytics - Privacy Statement. http:\/\/euclidanalytics.com\/privacy\/statement\/."},{"key":"e_1_3_2_1_4_1","unstructured":"eyeQ - Privacy Policy. http:\/\/www.eyeqinsights.com\/?page_id=183.  eyeQ - Privacy Policy. http:\/\/www.eyeqinsights.com\/?page_id=183."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.euclidanalytics.com.  http:\/\/www.euclidanalytics.com."},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.navizon.com\/.  http:\/\/www.navizon.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"iInside - Privacy Policy. http:\/\/iinside.com\/privacy-policy\/.  iInside - Privacy Policy. http:\/\/iinside.com\/privacy-policy\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Libelium - internet of things platform provider. http:\/\/www.libelium.com\/.  Libelium - internet of things platform provider. http:\/\/www.libelium.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Ma-l public listing. http:\/\/standards.ieee.org\/develop\/regauth\/oui\/public.html.  Ma-l public listing. http:\/\/standards.ieee.org\/develop\/regauth\/oui\/public.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Measurence. http:\/\/www.measurence.com.  Measurence. http:\/\/www.measurence.com."},{"key":"e_1_3_2_1_11_1","unstructured":"Mexia - Privacy Certified. http:\/\/mexia.ca\/privacy-certified\/.  Mexia - Privacy Certified. http:\/\/mexia.ca\/privacy-certified\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Navizon - Privacy. http:\/\/support.navizon.com\/are-there-any-security-and-data-privacy-concerns-%when-using-navizon-products\/.  Navizon - Privacy. http:\/\/support.navizon.com\/are-there-any-security-and-data-privacy-concerns-%when-using-navizon-products\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Nomi - Privacy. http:\/\/nomi.com\/privacy\/.  Nomi - Privacy. http:\/\/nomi.com\/privacy\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Radius Networks Privacy Policy. http:\/\/www.radiusnetworks.com\/privacy-policy.html.  Radius Networks Privacy Policy. http:\/\/www.radiusnetworks.com\/privacy-policy.html."},{"key":"e_1_3_2_1_15_1","unstructured":"ReadMe systems - Privacy. http:\/\/readmesys.net\/privacy.html.  ReadMe systems - Privacy. http:\/\/readmesys.net\/privacy.html."},{"key":"e_1_3_2_1_16_1","unstructured":"RetailNext - Privacy Policy. http:\/\/retailnext.net\/policies\/privacy-policy\/.  RetailNext - Privacy Policy. http:\/\/retailnext.net\/policies\/privacy-policy\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Solomo - Privacy Policy. http:\/\/www.solomotechnology.com\/privacy-policy.html.  Solomo - Privacy Policy. http:\/\/www.solomotechnology.com\/privacy-policy.html."},{"key":"e_1_3_2_1_18_1","unstructured":"Turnstyle Analytics INC. Privacy Policy. http:\/\/www.getturnstyle.com\/tos\/privacy.html.  Turnstyle Analytics INC. Privacy Policy. http:\/\/www.getturnstyle.com\/tos\/privacy.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Walkbase - Privacy. http:\/\/www.walkbase.com\/optout.  Walkbase - Privacy. http:\/\/www.walkbase.com\/optout."},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","author":"Telecommunications IEEE","year":"2012","unstructured":"IEEE Standard for Information technology-- Telecommunications and information exchange between systems local and metropolitan area networks-- Specific requirements Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications . IEEE Std 802.11-- 2012 (Revision of IEEE Std 802.11--2007), pages 1 -- 2793 , 2012. IEEE Standard for Information technology--Telecommunications and information exchange between systems local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11--2012 (Revision of IEEE Std 802.11--2007), pages 1--2793, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.04.001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/ecej:19950106"},{"key":"e_1_3_2_1_24_1","volume-title":"Unique in the Crowd: The privacy bounds of human mobility. Sci. Rep., 3, mar","author":"Yves-Alexandre Montjoye","year":"2013","unstructured":"de Montjoye Yves-Alexandre , Hidalgo Cesar A., Verleysen Michel , and Blondel Vincent D. Unique in the Crowd: The privacy bounds of human mobility. Sci. Rep., 3, mar 2013 . 10.1038\/srep01376. de Montjoye Yves-Alexandre, Hidalgo Cesar A., Verleysen Michel, and Blondel Vincent D. Unique in the Crowd: The privacy bounds of human mobility. Sci. Rep., 3, mar 2013. 10.1038\/srep01376."},{"key":"e_1_3_2_1_25_1","volume-title":"John the Ripper password cracker","author":"Designer Solar","year":"2014","unstructured":"Solar Designer . John the Ripper password cracker , 2014 . http:\/\/www.openwall.com\/john\/. Solar Designer. John the Ripper password cracker, 2014. http:\/\/www.openwall.com\/john\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361397.1361407"},{"key":"e_1_3_2_1_27_1","volume-title":"RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace","author":"Leach P.","year":"2005","unstructured":"P. Leach , M. Mealling , and R. Salz . RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace , 2005 . http:\/\/www.ietf.org\/rfc\/rfc4122.txt. P. Leach, M. Mealling, and R. Salz. RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace, 2005. http:\/\/www.ietf.org\/rfc\/rfc4122.txt."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"e_1_3_2_1_30_1","volume-title":"Mobile Location Analytics Code of Conduct","author":"Privacy Forum Future","year":"2013","unstructured":"Future of Privacy Forum . Mobile Location Analytics Code of Conduct , 2013 . http:\/\/www.futureofprivacy.org\/wp-content\/uploads\/10.22.13-FINAL-MLA-Code.pdf. Future of Privacy Forum. Mobile Location Analytics Code of Conduct, 2013. http:\/\/www.futureofprivacy.org\/wp-content\/uploads\/10.22.13-FINAL-MLA-Code.pdf."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track","author":"Percival Colin","year":"2009","unstructured":"Colin Percival . Stronger Key Derivation via Sequential Memory-Hard Functions . In USENIX Annual Technical Conference, FREENIX Track , Ottawa, Canada , 2009 . Colin Percival. Stronger Key Derivation via Sequential Memory-Hard Functions. In USENIX Annual Technical Conference, FREENIX Track, Ottawa, Canada, 2009."},{"key":"e_1_3_2_1_32_1","first-page":"81","volume-title":"Provos and David Mazi\u00e8res. A Future-Adaptable Password Scheme. In USENIX Annual Technical Conference, FREENIX Track","author":"Niels","year":"1999","unstructured":"Niels Provos and David Mazi\u00e8res. A Future-Adaptable Password Scheme. In USENIX Annual Technical Conference, FREENIX Track , pages 81 -- 91 , Monterey, California, USA , 1999 . USENIX. Niels Provos and David Mazi\u00e8res. A Future-Adaptable Password Scheme. In USENIX Annual Technical Conference, FREENIX Track, pages 81--91, Monterey, California, USA, 1999. USENIX."},{"key":"e_1_3_2_1_33_1","volume-title":"hashcat advanced password recovery","author":"Steube Jens","year":"2014","unstructured":"Jens Steube . hashcat advanced password recovery , 2014 . http:\/\/hashcat.net. Jens Steube. hashcat advanced password recovery, 2014. http:\/\/hashcat.net."}],"event":{"name":"MobiSys'14: The 12th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bretton Woods New Hampshire USA","acronym":"MobiSys'14"},"container-title":["Proceedings of the 2014 workshop on physical analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611264.2611266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2611264.2611266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:04Z","timestamp":1750229764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611264.2611266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,11]]},"references-count":33,"alternative-id":["10.1145\/2611264.2611266","10.1145\/2611264"],"URL":"https:\/\/doi.org\/10.1145\/2611264.2611266","relation":{},"subject":[],"published":{"date-parts":[[2014,6,11]]},"assertion":[{"value":"2014-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}