{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:54Z","timestamp":1776102054536,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Austrian Research Promotion Agency","award":["846028"],"award-info":[{"award-number":["846028"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,11]]},"DOI":"10.1145\/2837185.2837202","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy and data protection in smartphone messengers"],"prefix":"10.1145","author":[{"given":"Christoph","family":"Rottermanner","sequence":"first","affiliation":[{"name":"St. Poelten University of Applied Sciences, Austria"}]},{"given":"Peter","family":"Kieseberg","sequence":"additional","affiliation":[{"name":"SBA Research, Austria"}]},{"given":"Markus","family":"Huber","sequence":"additional","affiliation":[{"name":"St. Poelten University of Applied Sciences, Austria"}]},{"given":"Martin","family":"Schmiedecker","sequence":"additional","affiliation":[{"name":"SBA Research, Austria"}]},{"given":"Sebastian","family":"Schrittwieser","sequence":"additional","affiliation":[{"name":"University of Applied Sciences, Austria"}]}],"member":"320","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The difficulty of private contact discovery (https:\/\/whispersystems.org\/blog\/contact-discovery). Accessed: 2015-04-26.  The difficulty of private contact discovery (https:\/\/whispersystems.org\/blog\/contact-discovery). Accessed: 2015-04-26."},{"key":"e_1_3_2_1_2_1","unstructured":"Intercept with otr encrypted chat (http:\/\/www.spiegel.de\/media\/media-35552.pdf). Accessed: 2015-04-26.  Intercept with otr encrypted chat (http:\/\/www.spiegel.de\/media\/media-35552.pdf). Accessed: 2015-04-26."},{"key":"e_1_3_2_1_3_1","unstructured":"Perfect forward secret telegram messenger (https:\/\/core.telegram.org\/api\/end-to-end#perfect-forward-secrecy). Accessed: 2015-05-03.  Perfect forward secret telegram messenger (https:\/\/core.telegram.org\/api\/end-to-end#perfect-forward-secrecy). Accessed: 2015-05-03."},{"key":"e_1_3_2_1_4_1","unstructured":"Telegram encryption (https:\/\/core.telegram.org\/mtproto). Accessed: 2015-04-22.  Telegram encryption (https:\/\/core.telegram.org\/mtproto). Accessed: 2015-04-22."},{"key":"e_1_3_2_1_5_1","unstructured":"Textsecure (https:\/\/whispersystems.org\/blog\/the-new-textsecure\/). Accessed: 2015-04-22.  Textsecure (https:\/\/whispersystems.org\/blog\/the-new-textsecure\/). Accessed: 2015-04-22."},{"key":"e_1_3_2_1_6_1","unstructured":"Textsecure saying goodbye to encrypted sms\/mms (https:\/\/whispersystems.org\/blog\/goodbye-encrypted-sms\/). Accessed: 2015-04-22.  Textsecure saying goodbye to encrypted sms\/mms (https:\/\/whispersystems.org\/blog\/goodbye-encrypted-sms\/). Accessed: 2015-04-22."},{"key":"e_1_3_2_1_7_1","unstructured":"Wechat voice privacy policy (http:\/\/voice.wechat.com\/policy.html) 2013. Accessed: 2015-05-04.  Wechat voice privacy policy (http:\/\/voice.wechat.com\/policy.html) 2013. Accessed: 2015-05-04."},{"key":"e_1_3_2_1_8_1","unstructured":"Open whisper systems partners with whatsapp to provide end-to-end encryption (https:\/\/whispersystems.org\/blog\/whatsapp\/) 2014. Accessed: 2015-03-07.  Open whisper systems partners with whatsapp to provide end-to-end encryption (https:\/\/whispersystems.org\/blog\/whatsapp\/) 2014. Accessed: 2015-03-07."},{"key":"e_1_3_2_1_9_1","first-page":"15","article-title":"The nsa is building the countrys biggest spy center (watch what you say)","author":"Bamford J.","year":"2012","unstructured":"J. Bamford . The nsa is building the countrys biggest spy center (watch what you say) . Wired, March , 15 , 2012 . J. Bamford. The nsa is building the countrys biggest spy center (watch what you say). Wired, March, 15, 2012.","journal-title":"Wired, March"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484356"},{"key":"e_1_3_2_1_11_1","volume-title":"How to decrypt wechat enmicromsg.db database?","author":"Darus F. M.","year":"2014","unstructured":"F. M. Darus . How to decrypt wechat enmicromsg.db database? , 2014 . Accessed : 2015-05-03. F. M. Darus. How to decrypt wechat enmicromsg.db database?, 2014. Accessed: 2015-05-03."},{"key":"e_1_3_2_1_12_1","volume-title":"Wechat: the chinese social media app that has dissidents worried","author":"Davison N.","year":"2012","unstructured":"N. Davison . Wechat: the chinese social media app that has dissidents worried , 2012 . Accessed : 2015-05-04. N. Davison. Wechat: the chinese social media app that has dissidents worried, 2012. Accessed: 2015-05-04."},{"key":"e_1_3_2_1_13_1","unstructured":"B. Eun-ji. Actual users of the messenger line. Accessed: 2015-03-07.  B. Eun-ji. Actual users of the messenger line. Accessed: 2015-03-07."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.50"},{"issue":"6","key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Nsa prism program taps in to user data of apple, google and others","volume":"7","author":"Greenwald G.","year":"2013","unstructured":"G. Greenwald and E. MacAskill . Nsa prism program taps in to user data of apple, google and others . The Guardian , 7 ( 6 ): 1 -- 43 , 2013 . G. Greenwald and E. MacAskill. Nsa prism program taps in to user data of apple, google and others. The Guardian, 7(6):1--43, 2013.","journal-title":"The Guardian"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.2991\/978-94-91216-71-8_2","volume-title":"Trustworthy Ubiquitous Computing","author":"Kieseberg P.","year":"2012","unstructured":"P. Kieseberg , S. Schrittwieser , M. Leithner , M. Mulazzani , E. Weippl , L. Munroe , and M. Sinha . Malicious pixels using qr codes as attack vector . In Trustworthy Ubiquitous Computing , pages 21 -- 38 . Atlantis Press , 2012 . P. Kieseberg, S. Schrittwieser, M. Leithner, M. Mulazzani, E. Weippl, L. Munroe, and M. Sinha. Malicious pixels using qr codes as attack vector. In Trustworthy Ubiquitous Computing, pages 21--38. Atlantis Press, 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"Forensic analysis of instant messenger applications on android devices. arXiv preprint arXiv:1304.4915","author":"Mahajan A.","year":"2013","unstructured":"A. Mahajan , M. Dahiya , and H. Sanghvi . Forensic analysis of instant messenger applications on android devices. arXiv preprint arXiv:1304.4915 , 2013 . A. Mahajan, M. Dahiya, and H. Sanghvi. Forensic analysis of instant messenger applications on android devices. arXiv preprint arXiv:1304.4915, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684200.2684328"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-04-2015-0020"},{"key":"e_1_3_2_1_21_1","volume-title":"NDSS","author":"Schrittwieser S.","year":"2012","unstructured":"S. Schrittwieser , P. Fr\u00fchwirt , P. Kieseberg , M. Leithner , M. Mulazzani , M. Huber , and E. R. Weippl . Guess who's texting you? evaluating the security of smartphone messaging applications . In NDSS , 2012 . S. Schrittwieser, P. Fr\u00fchwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, and E. R. Weippl. Guess who's texting you? evaluating the security of smartphone messaging applications. In NDSS, 2012."},{"key":"e_1_3_2_1_22_1","volume-title":"Line app gets 'hidden chat' feature for encrypted, ephemeral messaging","author":"Sinha R.","year":"2014","unstructured":"R. Sinha . Line app gets 'hidden chat' feature for encrypted, ephemeral messaging , 2014 . Accessed : 2015-03-07. R. Sinha. Line app gets 'hidden chat' feature for encrypted, ephemeral messaging, 2014. Accessed: 2015-03-07."},{"key":"e_1_3_2_1_23_1","first-page":"297","volume-title":"Internet Technology And Secured Transactions, 2012 International Conference for","author":"Stirparo P.","year":"2012","unstructured":"P. Stirparo and I. Kounelis . The mobileak project: Forensics methodology for mobile application privacy assessment . In Internet Technology And Secured Transactions, 2012 International Conference for , pages 297 -- 303 . IEEE, 2012 . P. Stirparo and I. Kounelis. The mobileak project: Forensics methodology for mobile application privacy assessment. In Internet Technology And Secured Transactions, 2012 International Conference for, pages 297--303. IEEE, 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.22"},{"key":"e_1_3_2_1_25_1","volume-title":"Whatsapp privacy problem explained in detail","author":"Zweerink M.","year":"2015","unstructured":"M. Zweerink . Whatsapp privacy problem explained in detail , 2015 . Accessed : 2015-05-17. M. Zweerink. Whatsapp privacy problem explained in detail, 2015. Accessed: 2015-05-17."}],"event":{"name":"iiWAS '15: The 17th International Conference on Information Integration and Web-based Application & Services","location":"Brussels Belgium","acronym":"iiWAS '15"},"container-title":["Proceedings of the 17th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837185.2837202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837185.2837202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:21Z","timestamp":1750225701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837185.2837202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":24,"alternative-id":["10.1145\/2837185.2837202","10.1145\/2837185"],"URL":"https:\/\/doi.org\/10.1145\/2837185.2837202","relation":{},"subject":[],"published":{"date-parts":[[2015,12,11]]},"assertion":[{"value":"2015-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}