{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:02:36Z","timestamp":1771063356066,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Intel Collaborative Research Institute on Secure Computing"},{"name":"Academy of Finland","award":["Contextual Security 274951"],"award-info":[{"award-number":["Contextual Security 274951"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2714576.2714634","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"567-577","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["I Know Where You are"],"prefix":"10.1145","author":[{"given":"Markus","family":"Miettinen","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"Aalto University and University of Helsinki, Espoo and Helsinki, Finland"}]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]},{"given":"Thien Duc","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Jon","family":"Rios","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Majid","family":"Sobhani","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Sudha","family":"Yellapantula","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fast discovery of association rules. Advances in knowledge discovery and data mining, 12(1):307--328","author":"Agrawal Rakesh","year":"1996","unstructured":"Rakesh Agrawal , Heikki Mannila , Ramakrishnan Srikant , Hannu Toivonen , A Inkeri Verkamo , Fast discovery of association rules. Advances in knowledge discovery and data mining, 12(1):307--328 , 1996 . Rakesh Agrawal, Heikki Mannila, Ramakrishnan Srikant, Hannu Toivonen, A Inkeri Verkamo, et al. Fast discovery of association rules. Advances in knowledge discovery and data mining, 12(1):307--328, 1996."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2012.6502516"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_26"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.60"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_22"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_1_8_1","unstructured":"Foursquare Labs Inc. foursquare.com. (online last referenced {2014-07-24}).  Foursquare Labs Inc. foursquare.com. (online last referenced {2014-07-24})."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653692"},{"key":"e_1_3_2_1_10_1","volume-title":"NDSS","author":"Narayanan Arvind","year":"2011","unstructured":"Arvind Narayanan , Narendran Thiagarajan , Mugdha Lakhani , Michael Hamburg , and Dan Boneh . Location privacy via private proximity testing . In NDSS , 2011 . Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, and Dan Boneh. Location privacy via private proximity testing. In NDSS, 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523653"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514414"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_23"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Alex\n      Varshavsky Adin\n      Scannell Anthony\n      LaMarca and \n      Eyal\n      Lara\n    .\n  Amigo: Proximity-based authentication of mobile devices\n  . In John Krumm Gregory D. Abowd Aruna Seneviratne and Thomas Strang editors UbiComp \n  2007\n  : Ubiquitous Computing volume \n  4717\n   of \n  Lecture Notes in Computer Science pages \n  253\n  --\n  270\n  . \n  Springer Berlin Heidelberg 2007.   Alex Varshavsky Adin Scannell Anthony LaMarca and Eyal Lara. Amigo: Proximity-based authentication of mobile devices. In John Krumm Gregory D. Abowd Aruna Seneviratne and Thomas Strang editors UbiComp 2007: Ubiquitous Computing volume 4717 of Lecture Notes in Computer Science pages 253--270. Springer Berlin Heidelberg 2007.","DOI":"10.1007\/978-3-540-74853-3_15"}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714576.2714634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:54Z","timestamp":1750227414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714634"}},"subtitle":["Proofs of Presence Resilient to Malicious Provers"],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":16,"alternative-id":["10.1145\/2714576.2714634","10.1145\/2714576"],"URL":"https:\/\/doi.org\/10.1145\/2714576.2714634","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}