{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T04:42:14Z","timestamp":1770266534799,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:00:00Z","timestamp":1497571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2261"],"award-info":[{"award-number":["N00014-16-1-2261"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,16]]},"DOI":"10.1145\/3081333.3081345","type":"proceedings-article","created":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T18:24:43Z","timestamp":1497637483000},"page":"475-487","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Techu"],"prefix":"10.1145","author":[{"given":"Ioannis","family":"Agadakos","sequence":"first","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Jason","family":"Polakis","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cryptographic key length recommendation. https:\/\/www.keylength.com\/en\/.  Cryptographic key length recommendation. https:\/\/www.keylength.com\/en\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Daily mail - samsonite set to install tracking beacons. http:\/\/www.dailymail.co.uk\/sciencetech\/article-3540967\/Now-lost-luggage-tell-Samsonite-set-install\/tracking-beacons-new-cases-using-smartphone-app.html.  Daily mail - samsonite set to install tracking beacons. http:\/\/www.dailymail.co.uk\/sciencetech\/article-3540967\/Now-lost-luggage-tell-Samsonite-set-install\/tracking-beacons-new-cases-using-smartphone-app.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Daily news - lost items cost americans $5 591: survey. http:\/\/www.nydailynews.com\/news\/national\/lost-items-cost- americans-5--591-survey-article-1.2237244.  Daily news - lost items cost americans $5 591: survey. http:\/\/www.nydailynews.com\/news\/national\/lost-items-cost- americans-5--591-survey-article-1.2237244."},{"key":"e_1_3_2_1_4_1","unstructured":"Forbes - if you're not paying for it you become the product. http:\/\/www.forbes.com\/sites\/marketshare\/2012\/03\/05\/if-youre-not-paying-for-it-you-become-the-product\/.  Forbes - if you're not paying for it you become the product. http:\/\/www.forbes.com\/sites\/marketshare\/2012\/03\/05\/if-youre-not-paying-for-it-you-become-the-product\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Identity theft resource center - 2015 data breaches. http:\/\/www.idtheftcenter.org\/ITRC-Surveys-Studies\/2015databreaches.html.  Identity theft resource center - 2015 data breaches. http:\/\/www.idtheftcenter.org\/ITRC-Surveys-Studies\/2015databreaches.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Network world - biggest data breaches of 2015. http:\/\/www.networkworld.com\/article\/3011103\/security\/biggest-data-breaches-of-2015.html.  Network world - biggest data breaches of 2015. http:\/\/www.networkworld.com\/article\/3011103\/security\/biggest-data-breaches-of-2015.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Reuters - amazon bolsters voice based-platform alexa with investment in trackr. http:\/\/www.reuters.com\/article\/us-amazon-com-alexa-trackr-idUSKCN0XT1GB.  Reuters - amazon bolsters voice based-platform alexa with investment in trackr. http:\/\/www.reuters.com\/article\/us-amazon-com-alexa-trackr-idUSKCN0XT1GB."},{"key":"e_1_3_2_1_8_1","unstructured":"Trackr -- pets. http:\/\/support.thetrackr.com\/hc\/en-us\/articles\/210902166-Can-I-Use-TrackR-On-My-Pet-.  Trackr -- pets. http:\/\/support.thetrackr.com\/hc\/en-us\/articles\/210902166-Can-I-Use-TrackR-On-My-Pet-."},{"key":"e_1_3_2_1_9_1","unstructured":"https:\/\/www.indiegogo.com\/projects\/trackr-bravo-the-thinnest-tracking-device-ever-2#\/.  https:\/\/www.indiegogo.com\/projects\/trackr-bravo-the-thinnest-tracking-device-ever-2#\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Washington post - nsa tracking cellphone locations worldwide snowden documents show. https:\/\/www.washingtonpost.com\/world\/national-security\/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show\/2013\/12\/04\/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html.  Washington post - nsa tracking cellphone locations worldwide snowden documents show. https:\/\/www.washingtonpost.com\/world\/national-security\/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show\/2013\/12\/04\/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.20"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_13_1","unstructured":"Associated Press. NYC transit hubs handle flood of lost items. Crain's New York Business Dec 2013. http:\/\/www.crainsnewyork.com\/article\/20131227\/ TRANSPORTATION\/131229942\/nyc-transit-hubs-handle-flood-of-lost-items.  Associated Press. NYC transit hubs handle flood of lost items. Crain's New York Business Dec 2013. http:\/\/www.crainsnewyork.com\/article\/20131227\/ TRANSPORTATION\/131229942\/nyc-transit-hubs-handle-flood-of-lost-items."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644928"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"e_1_3_2_1_16_1","unstructured":"K. Bishop. Growth business: GPS tracking the elderly. CNBC. http:\/\/www.cnbc.com\/2014\/03\/11\/growth-business-gps-tracking-the-elderly.html.  K. Bishop. Growth business: GPS tracking the elderly. CNBC. http:\/\/www.cnbc.com\/2014\/03\/11\/growth-business-gps-tracking-the-elderly.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Bluetooth SIG. Specification of the Bluetooth system 2010. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=229737.  Bluetooth SIG. Specification of the Bluetooth system 2010. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=229737."},{"key":"e_1_3_2_1_18_1","unstructured":"Bluetooth Special Interest Group. Bluetooth Specification 4.2 edition 2014.  Bluetooth Special Interest Group. Bluetooth Specification 4.2 edition 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660345"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45917-1_6"},{"key":"e_1_3_2_1_21_1","volume-title":"VentureBeat, 2015","author":"Cohen S.","year":"2015"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378624"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_1_24_1","first-page":"3","article-title":"Unique in the crowd: The privacy bounds of human mobility","author":"de Montjoye Y.-A.","year":"2013","journal-title":"Nature Scientific Reports"},{"key":"e_1_3_2_1_25_1","volume-title":"DTIC Document","author":"Dingledine R.","year":"2004"},{"key":"e_1_3_2_1_26_1","volume-title":"Information Processing in Sensor Networks (IPSN)","author":"Faulkner M.","year":"2011"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"C. Frank P. Bolliger C. Roduner and W. Kellerer. Objects calling home: Locating objects using mobile phones. Pervasive computing pages 351--368 2007.   C. Frank P. Bolliger C. Roduner and W. Kellerer. Objects calling home: Locating objects using mobile phones. Pervasive computing pages 351--368 2007.","DOI":"10.1007\/978-3-540-72037-9_21"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"G. Ghinita. Privacy for location-based services. Synthesis Lectures on Information Security Privacy and Trust 4(1) 2013.   G. Ghinita. Privacy for location-based services. Synthesis Lectures on Information Security Privacy and Trust 4(1) 2013.","DOI":"10.2200\/S00485ED1V01Y201303SPT004"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s120911734"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"M. C. Gonzalez C. A. Hidalgo and A.-L. Barabasi. Understanding individual human mobility patterns. Nature 453(7196) 2008.  M. C. Gonzalez C. A. Hidalgo and A.-L. Barabasi. Understanding individual human mobility patterns. Nature 453(7196) 2008.","DOI":"10.1038\/nature06958"},{"key":"e_1_3_2_1_33_1","unstructured":"Google. Google cloud messaging. https:\/\/developers.google.com\/cloud-messaging\/.  Google. Google cloud messaging. https:\/\/developers.google.com\/cloud-messaging\/."},{"key":"e_1_3_2_1_34_1","unstructured":"Google. Growing Eddystone with ephemeral identifiers: A privacy aware & secure open beacon format 2016. https:\/\/developers.googleblog.com\/2016\/04\/growing-eddystone-with-ephemeral-identifiers.html.  Google. Growing Eddystone with ephemeral identifiers: A privacy aware & secure open beacon format 2016. https:\/\/developers.googleblog.com\/2016\/04\/growing-eddystone-with-ephemeral-identifiers.html."},{"key":"e_1_3_2_1_35_1","unstructured":"M. Green. A riddle wrapped in a curve. https:\/\/blog.cryptographyengineering.com\/2015\/10\/22\/a-riddle-wrapped-in-curve\/.  M. Green. A riddle wrapped in a curve. https:\/\/blog.cryptographyengineering.com\/2015\/10\/22\/a-riddle-wrapped-in-curve\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886332"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2794400"},{"key":"e_1_3_2_1_39_1","volume-title":"Ubicomp Poster Proceedings. Citeseer","author":"Haase M.","year":"2004"},{"key":"e_1_3_2_1_40_1","first-page":"1443","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on","author":"Han K.","year":"2011"},{"key":"e_1_3_2_1_41_1","unstructured":"https:\/\/www.thetileapp.com\/. Tilebeacon.  https:\/\/www.thetileapp.com\/. Tilebeacon."},{"key":"e_1_3_2_1_42_1","unstructured":"https:\/\/www.thetrackr.com\/. Trackr.  https:\/\/www.thetrackr.com\/. Trackr."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398790"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866318"},{"key":"e_1_3_2_1_45_1","first-page":"176","volume-title":"Cryptographers' Track at the RSA Conference","author":"Jakobsson M.","year":"2001"},{"key":"e_1_3_2_1_46_1","volume-title":"The SafeWise Report","author":"Jones C.","year":"2015"},{"key":"e_1_3_2_1_47_1","unstructured":"P. Kindt D. Yunge R. Diemer and S. Chakraborty. Precise energy modeling for the bluetooth low energy protocol.arXiv preprint arXiv:1403.2919 2014.  P. Kindt D. Yunge R. Diemer and S. Chakraborty. Precise energy modeling for the bluetooth low energy protocol.arXiv preprint arXiv:1403.2919 2014."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.120"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"J. Krumm. Inference attacks on location tracks. Pervasive computing pages 127--143 2007.   J. Krumm. Inference attacks on location tracks. Pervasive computing pages 127--143 2007.","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411759.1411763"},{"key":"e_1_3_2_1_52_1","unstructured":"R. Lawler. Land Rover puts Tile's stuff-finding Bluetooth tech in an SUV. engadget 2016. https:\/\/www.engadget.com\/2016\/04\/26\/land-rover-puts-tiles-stuff-finding-bluetooth-tech-in-an-suv\/.  R. Lawler. Land Rover puts Tile's stuff-finding Bluetooth tech in an SUV. engadget 2016. https:\/\/www.engadget.com\/2016\/04\/26\/land-rover-puts-tiles-stuff-finding-bluetooth-tech-in-an-suv\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Maxell. Cr1616 battery datasheet. http:\/\/www.maxell.com.tw\/images\/uploads\/2014\/10\/CR1616_DataSheet_e.pdf.  Maxell. Cr1616 battery datasheet. http:\/\/www.maxell.com.tw\/images\/uploads\/2014\/10\/CR1616_DataSheet_e.pdf."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866938"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460444"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525343"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920920"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813605"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523653"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"S. C. Rhea. Opendht: A Public Dht Service. PhD thesis 2005.   S. C. Rhea. Opendht: A Public Dht Service. PhD thesis 2005.","DOI":"10.1145\/1080091.1080102"},{"key":"e_1_3_2_1_61_1","first-page":"275","volume-title":"Usenix Security Symposium","author":"Ristenpart T.","year":"2008"},{"key":"e_1_3_2_1_62_1","unstructured":"J. L. Sandeep Kamath. Measuring bluetooth\u00ae low energy power consumption application note an092.  J. L. Sandeep Kamath. Measuring bluetooth\u00ae low energy power consumption application note an092."},{"key":"e_1_3_2_1_63_1","volume-title":"Usenix Security","volume":"3","author":"Saponas T. S.","year":"2007"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_3_2_1_66_1","volume-title":"PRESS RELEASE, 2016","author":"B. S. I. G.","year":"2016"},{"key":"e_1_3_2_1_67_1","first-page":"6","article-title":"Reforming ecpa's secret docket","author":"Smith S. W.","year":"2012","journal-title":"Harvard Law & Policy Review"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179559.1179562"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534912.1534914"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2495291"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732966"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_16"},{"key":"e_1_3_2_1_73_1","unstructured":"Unacast. Beacons on track to hit 400M deployed by 2020 reports Unacast. BusinessWire. http:\/\/www.businesswire.com\/news\/home\/20160126005779\/ en\/Beacons-Track-Hit-400M-Deployed-2020-Reports.  Unacast. Beacons on track to hit 400M deployed by 2020 reports Unacast. BusinessWire. http:\/\/www.businesswire.com\/news\/home\/20160126005779\/ en\/Beacons-Track-Hit-400M-Deployed-2020-Reports."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906420"}],"event":{"name":"MobiSys'17: The 15th Annual International Conference on Mobile Systems, Applications, and Services","location":"Niagara Falls New York USA","acronym":"MobiSys'17","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3081333.3081345","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3081333.3081345","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3081333.3081345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:00Z","timestamp":1750217820000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3081333.3081345"}},"subtitle":["Open and Privacy-Preserving Crowdsourced GPS for the Masses"],"short-title":[],"issued":{"date-parts":[[2017,6,16]]},"references-count":74,"alternative-id":["10.1145\/3081333.3081345","10.1145\/3081333"],"URL":"https:\/\/doi.org\/10.1145\/3081333.3081345","relation":{},"subject":[],"published":{"date-parts":[[2017,6,16]]},"assertion":[{"value":"2017-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}