{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:34:49Z","timestamp":1759638889611,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,3]],"date-time":"2016-10-03T00:00:00Z","timestamp":1475452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,3]]},"DOI":"10.1145\/2973750.2973778","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:17:32Z","timestamp":1475176652000},"page":"387-400","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["MASHaBLE"],"prefix":"10.1145","author":[{"given":"Yan","family":"Michalevsky","sequence":"first","affiliation":[{"name":"Stanford University"}]},{"given":"Suman","family":"Nath","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2016,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Afterschool http:\/\/afterschoolapp.com\/app.  Afterschool http:\/\/afterschoolapp.com\/app."},{"key":"e_1_3_2_1_2_1","unstructured":"Complete keyless www.completekeyless.com.  Complete keyless www.completekeyless.com."},{"key":"e_1_3_2_1_3_1","unstructured":"Connect2car www.connect2car.com.  Connect2car www.connect2car.com."},{"key":"e_1_3_2_1_4_1","unstructured":"Dubbledutch.me http:\/\/doubledutch.me\/attendance-tracking.html.  Dubbledutch.me http:\/\/doubledutch.me\/attendance-tracking.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Legatalk http:\/\/legatalk.com.  Legatalk http:\/\/legatalk.com."},{"key":"e_1_3_2_1_6_1","unstructured":"Multiple precision integers and rationals library mpir.org.  Multiple precision integers and rationals library mpir.org."},{"key":"e_1_3_2_1_7_1","unstructured":"Open whisper systems https:\/\/whispersystems.org.  Open whisper systems https:\/\/whispersystems.org."},{"key":"e_1_3_2_1_8_1","unstructured":"Sharpen - Automated Java to C# coversion.  Sharpen - Automated Java to C# coversion."},{"key":"e_1_3_2_1_9_1","unstructured":"Telegram messenger https:\/\/telegram.org.  Telegram messenger https:\/\/telegram.org."},{"key":"e_1_3_2_1_10_1","unstructured":"Yik yak https:\/\/www.yikyak.com\/home.  Yik yak https:\/\/www.yikyak.com\/home."},{"volume-title":"Institution of Engineering and Technology","year":"2014","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","first-page":"159","volume-title":"Network and Distributed System Security Symposium","author":"Ateniese Giuseppe","year":"2007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830565"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_7"},{"key":"e_1_3_2_1_15_1","first-page":"443","volume-title":"Advances in Cryptology--Crypto","author":"Boneh Dan","year":"2004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_3_2_1_19_1","first-page":"293","volume-title":"10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004","volume":"3329","author":"Castelluccia Claude","year":"2004"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"e_1_3_2_1_21_1","unstructured":"Andreas Enge. Bilinear pairings on elliptic curves 2013.  Andreas Enge. Bilinear pairings on elliptic curves 2013."},{"key":"e_1_3_2_1_22_1","unstructured":"Giulia Fanti Peter Kairouz Sewoong Oh Kannan Ramchandran and Pramod Viswanath. Hiding the rumor source. arXiv preprint arXiv:1509.02849 2015.  Giulia Fanti Peter Kairouz Sewoong Oh Kannan Ramchandran and Pramod Viswanath. Hiding the rumor source. arXiv preprint arXiv:1509.02849 2015."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Steven D. Galbraith Kenneth G. Paterson and Nigel P. Smart. Pairings for cryptographers 2008.  Steven D. Galbraith Kenneth G. Paterson and Nigel P. Smart. Pairings for cryptographers 2008.","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378607"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.122810.102229"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Dan Harkins and Dave Carrel. Rfc 2409: The internet key exchange (ike) november 1998. Status: Proposed Standard.   Dan Harkins and Dave Carrel. Rfc 2409: The internet key exchange (ike) november 1998. Status: Proposed Standard.","DOI":"10.17487\/rfc2409"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.081880"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_18"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1594-x"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic number theory","author":"Joux Antoine","year":"2000"},{"key":"e_1_3_2_1_32_1","unstructured":"Philipp Kindt Daniel Yunge Robert Diemer and Samarjit Chakraborty. Precise Energy Modeling for the Bluetooth Low Energy Protocol. mar 2014.  Philipp Kindt Daniel Yunge Robert Diemer and Samarjit Chakraborty. Precise Energy Modeling for the Bluetooth Low Energy Protocol. mar 2014."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802130.2802137"},{"key":"e_1_3_2_1_34_1","unstructured":"Preeti Kulshrestha and Arun Kumar. A New Unlinkable Secret Handshakes Scheme based on ZSS.  Preeti Kulshrestha and Arun Kumar. A New Unlinkable Secret Handshakes Scheme based on ZSS."},{"key":"e_1_3_2_1_35_1","unstructured":"Ben Lynn. Pbc benchmarks https:\/\/crypto.stanford.edu\/pbc\/times.html.  Ben Lynn. Pbc benchmarks https:\/\/crypto.stanford.edu\/pbc\/times.html."},{"key":"e_1_3_2_1_36_1","unstructured":"Ben Lynn. Pbc library https:\/\/crypto.stanford.edu\/pbc.  Ben Lynn. Pbc library https:\/\/crypto.stanford.edu\/pbc."},{"key":"e_1_3_2_1_37_1","unstructured":"Ben Lynn. On the Implementation of Pairing-Based Cryptosystems. PhD thesis 2007.  Ben Lynn. On the Implementation of Pairing-Based Cryptosystems. PhD thesis 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0447-x"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0315-8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_9"},{"key":"e_1_3_2_1_41_1","first-page":"4","volume-title":"Ryan. Bluetooth: With Low Energy Comes Low Security. In Proceedings of the 7th USENIX Conference on Offensive Technologies","author":"Mike","year":"2013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660376"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.091228"},{"key":"e_1_3_2_1_44_1","unstructured":"Kevin Townsend Carles Cufi and Robert Davison. Getting Started with Bluetooth Low Energy 2014.   Kevin Townsend Carles Cufi and Robert Davison. Getting Started with Bluetooth Low Energy 2014."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/11779360_21"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.11.2614"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.091733"}],"event":{"name":"MobiCom'16: The 22nd Annual International Conference on Mobile Computing and Networking","acronym":"MobiCom'16","location":"New York City New York"},"container-title":["Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2973750.2973778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2973750.2973778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:11Z","timestamp":1750218011000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2973750.2973778"}},"subtitle":["mobile applications of secret handshakes over bluetooth LE"],"short-title":[],"issued":{"date-parts":[[2016,10,3]]},"references-count":47,"alternative-id":["10.1145\/2973750.2973778","10.1145\/2973750"],"URL":"https:\/\/doi.org\/10.1145\/2973750.2973778","relation":{},"subject":[],"published":{"date-parts":[[2016,10,3]]},"assertion":[{"value":"2016-10-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}