{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:42Z","timestamp":1750306482497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS #1218197"],"award-info":[{"award-number":["CNS #1218197"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813647","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1346-1357","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Authenticating Privately over Public Wi-Fi Hotspots"],"prefix":"10.1145","author":[{"given":"Aldo","family":"Cassola","sequence":"first","affiliation":[{"name":"Northeastern University &amp; Universidad San Francisco de Quito, Quito, Ecuador"}]},{"given":"Erik-Oliver","family":"Blass","sequence":"additional","affiliation":[{"name":"Airbus Group Innovations &amp; Northeastern University, Munich, Germany"}]},{"given":"Guevara","family":"Noubir","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"volume-title":"Nov.","year":"2002","author":"3GPP Technical Specification Group Services and System Aspects. 3GPP TSG S3.26","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595308"},{"volume-title":"Oct.","year":"2014","author":"Apple Inc.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9040-7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/188307.188361"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/517876"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_7"},{"volume-title":"A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication","year":"2013","author":"Cassola A.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters Version 1.0. http:\/\/www.secg.org\/sec2_final.pdf 2000.  Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters Version 1.0. http:\/\/www.secg.org\/sec2_final.pdf 2000."},{"key":"e_1_3_2_1_13_1","unstructured":"Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters Version 2.0. http:\/\/www.secg.org\/sec2_v2.pdf 2010.  Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters Version 2.0. http:\/\/www.secg.org\/sec2_v2.pdf 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"D.\n      Chaum\n     and \n      E.\n      van Heyst\n    .\n  Group Signatures\n  . In D. W. Davies editor EUROCRYPT volume \n  547\n   of \n  Lecture Notes in Computer Science pages \n  257\n  --\n  265\n  . \n  Springer 1991\n  .   D. Chaum and E. van Heyst. Group Signatures. In D. W. Davies editor EUROCRYPT volume 547 of Lecture Notes in Computer Science pages 257--265. Springer 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655204"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/648118.746742"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44993-5_5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19480"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/188105.188198"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"volume-title":"Stanford University","year":"2009","author":"Gentry C.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_65"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_31"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133604"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704291"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"volume-title":"http:\/\/standards.ieee.org\/findstds\/standard\/802.1X-2010.html","year":"2012","author":"Wireless IEEE.","key":"e_1_3_2_1_31_1"},{"volume-title":"http:\/\/tools.ietf.org\/html\/rfc4187","year":"2006","author":"Extensible Authentication Protocol IETF.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_22"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_35_1","first-page":"364","volume-title":"Computationally-Private Information Retrieval. In FOCS","author":"Kushilevitz E.","year":"1997"},{"volume-title":"Can Homomorphic Encryption be Practical? IACR Cryptology ePrint Archive","year":"2011","author":"Lauter K.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"N. Lee. Facebook's head of special projects talks wearables WiFi and human connections. http:\/\/www.engadget.com\/2013\/11\/11\/facebook-expand-ny\/.  N. Lee. Facebook's head of special projects talks wearables WiFi and human connections. http:\/\/www.engadget.com\/2013\/11\/11\/facebook-expand-ny\/."},{"volume-title":"IACR Cryptology ePrint Archive","year":"2009","author":"Lipmaa H.","key":"e_1_3_2_1_38_1"},{"volume-title":"http:\/\/hostap.epitest.fi\/wpa_supplicant\/","year":"2012","author":"Malinen J.","key":"e_1_3_2_1_39_1"},{"volume-title":"PIRMAP: Efficient Private Information Retrieval for MapReduce. IACR Cryptology ePrint Archive","year":"2012","author":"Mayberry T.","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704277"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"volume-title":"Technical report","year":"1998","author":"Noubir G.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","unstructured":"nVidia. Compute Unified Device Architecture. http:\/\/developer.nvidia.com\/object\/cuda.html 2012.  nVidia. Compute Unified Device Architecture. http:\/\/developer.nvidia.com\/object\/cuda.html 2012."},{"key":"e_1_3_2_1_45_1","unstructured":"OOKLA. The global broadband speed test. http:\/\/http:\/\/www.speedtest.net\/ 2014.  OOKLA. The global broadband speed test. http:\/\/http:\/\/www.speedtest.net\/ 2014."},{"key":"e_1_3_2_1_46_1","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology EUROCRYPT 99","author":"Paillier P.","year":"1999"},{"volume-title":"PGP Global Directory. https:\/\/keyserver.pgp.com","year":"2014","author":"PGP Corporation","key":"e_1_3_2_1_47_1"},{"volume-title":"IACR Cryptology ePrint Archive","year":"2010","author":"Pinkas B.","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"R. L.\n      Rivest A.\n      Shamir and \n      Y.\n      Tauman\n  . \n  How to Leak a Secret\n  . In C. Boyd editor ASIACRYPT volume \n  2248\n   of \n  Lecture Notes in Computer Science pages \n  552\n  --\n  565\n  . \n  Springer 2001\n  .   R. L. Rivest A. Shamir and Y. Tauman. How to Leak a Secret. In C. Boyd editor ASIACRYPT volume 2248 of Lecture Notes in Computer Science pages 552--565. Springer 2001.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_2_1_50_1","unstructured":"D. Rushe. Lavabit founder refused FBI order to hand over email encryption keys. http:\/\/www.theguardian.com\/world\/2013\/oct\/03\/lavabit-ladar-levison-fbi-encryption-keys-snowden Oct. 2013.  D. Rushe. Lavabit founder refused FBI order to hand over email encryption keys. http:\/\/www.theguardian.com\/world\/2013\/oct\/03\/lavabit-ladar-levison-fbi-encryption-keys-snowden Oct. 2013."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/647503.728470"},{"volume-title":"NTRU Reference Implementation","year":"2014","author":"Innovation Security","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.57"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.25"},{"key":"e_1_3_2_1_55_1","unstructured":"The IEEE P1363 Working Group. Standards for Lattice-Based public-key cryptography. http:\/\/grouper.ieee.org\/groups\/1363\/ 2008.  The IEEE P1363 Working Group. Standards for Lattice-Based public-key cryptography. http:\/\/grouper.ieee.org\/groups\/1363\/ 2008."},{"key":"e_1_3_2_1_56_1","unstructured":"The Namecoin Team. Namecoin 2015.  The Namecoin Team. Namecoin 2015."},{"volume-title":"Tor Metrics: Servers. https:\/\/metrics.torproject.org\/network.html","year":"2014","author":"Project The TOR","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2627"},{"key":"e_1_3_2_1_59_1","unstructured":"WatchGuard. Anatomy of a Wireless \"Evil Twin\" Attack. http:\/\/www.watchguard.com\/infocenter\/editorial\/27079.asp 2011.  WatchGuard. Anatomy of a Wireless \"Evil Twin\" Attack. http:\/\/www.watchguard.com\/infocenter\/editorial\/27079.asp 2011."},{"volume-title":"June","year":"2012","author":"Alliance WiFi","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.793005"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":61,"alternative-id":["10.1145\/2810103.2813647","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813647","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}