{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:05Z","timestamp":1750221185630,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Marie Sklodowska-Curie","award":["690972"],"award-info":[{"award-number":["690972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196496","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"425-430","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Where's Wally?"],"prefix":"10.1145","author":[{"given":"Panagiotis","family":"Papadopoulos","sequence":"first","affiliation":[{"name":"FORTH-ICS, Heraklion, Greece"}]},{"given":"Antonios A.","family":"Chariton","sequence":"additional","affiliation":[{"name":"University of Crete, Heraklion, Greece"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"FORTH-ICS, Heraklion, Greece"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"volume-title":"OSDI'16","author":"Angel S.","key":"e_1_3_2_1_2_1","unstructured":"S. Angel and S. Setty . Unobservable communication over fully untrusted infrastructure . In OSDI'16 . S. Angel and S. Setty. Unobservable communication over fully untrusted infrastructure. In OSDI'16."},{"key":"e_1_3_2_1_3_1","unstructured":"BI Intelligence. Messaging apps are now bigger than social networks. http:\/\/www.businessinsider.com\/the-messaging-app-report-2015--11 2016.  BI Intelligence. Messaging apps are now bigger than social networks. http:\/\/www.businessinsider.com\/the-messaging-app-report-2015--11 2016."},{"key":"e_1_3_2_1_4_1","unstructured":"N. Borisov G. Danezis and I. Goldberg. Dp5: A private presence service. In PET'15.  N. Borisov G. Danezis and I. Goldberg. Dp5: A private presence service. In PET'15."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905760.2905767"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"volume-title":"ATC '05","author":"Ford B.","key":"e_1_3_2_1_7_1","unstructured":"B. Ford , P. Srisuresh , and D. Kegel . Peer-to-peer communication across network address translators . In ATC '05 . B. Ford, P. Srisuresh, and D. Kegel. Peer-to-peer communication across network address translators. In ATC '05."},{"key":"e_1_3_2_1_8_1","unstructured":"Google. Google ipv6 statistics. https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html.  Google. Google ipv6 statistics. https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html."},{"key":"e_1_3_2_1_9_1","volume-title":"The DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol: TLSA. https:\/\/tools.ietf.org\/html\/rfc6698","author":"Hoffman P.","year":"2012","unstructured":"P. Hoffman and J. Schlyter . The DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol: TLSA. https:\/\/tools.ietf.org\/html\/rfc6698 , 2012 . P. Hoffman and J. Schlyter. The DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol: TLSA. https:\/\/tools.ietf.org\/html\/rfc6698, 2012."},{"key":"e_1_3_2_1_10_1","volume-title":"Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10)","author":"Jernigan C.","year":"2009","unstructured":"C. Jernigan and B. F. Mistree . Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10) , 2009 . C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009."},{"key":"e_1_3_2_1_11_1","volume-title":"MobEA '03","author":"Kato T.","year":"2003","unstructured":"T. Kato , N. Ishikawa , H. Sumino , J. Hjelm , Y. Yu , and S. Murakami . A platform and applications for mobile peer-to-peer communications . In MobEA '03 , 2003 . T. Kato, N. Ishikawa, H. Sumino, J. Hjelm, Y. Yu, and S. Murakami. A platform and applications for mobile peer-to-peer communications. In MobEA '03, 2003."},{"key":"e_1_3_2_1_12_1","unstructured":"J. Kopstein. The mission to decentralize the internet. http:\/\/www.newyorker.com\/tech\/elements\/the-mission-to-decentralize-the-internet 2013.  J. Kopstein. The mission to decentralize the internet. http:\/\/www.newyorker.com\/tech\/elements\/the-mission-to-decentralize-the-internet 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"Dns-based service discovery","author":"Krochmal M.","year":"2013","unstructured":"M. Krochmal and S. Cheshire . Dns-based service discovery . 2013 . M. Krochmal and S. Cheshire. Dns-based service discovery. 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068822"},{"key":"e_1_3_2_1_16_1","unstructured":"Legion of the Bouncy Castle Inc. Bouncy castle crypto apis. http:\/\/www.bouncycastle.org\/.  Legion of the Bouncy Castle Inc. Bouncy castle crypto apis. http:\/\/www.bouncycastle.org\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Dns based blacklists and whitelists","author":"Levine J. R.","year":"2010","unstructured":"J. R. Levine . Dns based blacklists and whitelists . 2010 . J. R. Levine. Dns based blacklists and whitelists. 2010."},{"key":"e_1_3_2_1_18_1","author":"Ling R.","year":"2007","unstructured":"R. Ling and N. S. Baron . Text messaging and im linguistic comparison of american college data. Journal of Language and Social Psychology , 2007 . R. Ling and N. S. Baron. Text messaging and im linguistic comparison of american college data. Journal of Language and Social Psychology, 2007.","journal-title":"Journal of Language and Social Psychology"},{"key":"e_1_3_2_1_19_1","volume-title":"Technology preview: Private contact discovery for signal. https:\/\/signal.org\/blog\/private-contact-discovery\/","author":"Marlinspike M.","year":"2017","unstructured":"M. Marlinspike . Technology preview: Private contact discovery for signal. https:\/\/signal.org\/blog\/private-contact-discovery\/ , 2017 . M. Marlinspike. Technology preview: Private contact discovery for signal. https:\/\/signal.org\/blog\/private-contact-discovery\/, 2017."},{"volume-title":"IPTPS'01","author":"Maymounkov P.","key":"e_1_3_2_1_20_1","unstructured":"P. Maymounkov and D. Mazi\u00e8res . Kademlia: A peer-to-peer information system based on the xor metric . In IPTPS'01 . P. Maymounkov and D. Mazi\u00e8res. Kademlia: A peer-to-peer information system based on the xor metric. In IPTPS'01."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_1_22_1","volume-title":"Privacy extensions for stateless address autoconfiguration in ipv6","author":"Narten T.","year":"2007","unstructured":"T. Narten , R. Draves , and S. Krishnan . Privacy extensions for stateless address autoconfiguration in ipv6 . 2007 . T. Narten, R. Draves, and S. Krishnan. Privacy extensions for stateless address autoconfiguration in ipv6. 2007."},{"key":"e_1_3_2_1_23_1","unstructured":"P. Olson. Facebook closes 19 billion whatsapp deal. www.forbes.com\/sites\/parmyolson\/2014\/10\/06\/facebook-closes-19-billion-whatsapp-deal.  P. Olson. Facebook closes 19 billion whatsapp deal. www.forbes.com\/sites\/parmyolson\/2014\/10\/06\/facebook-closes-19-billion-whatsapp-deal."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052691"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186060"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193117"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131397"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523671"},{"key":"e_1_3_2_1_29_1","unstructured":"A. Peterson. Bankrupt radioshack wants to sell off user data. but the bigger risk is if a facebook or google goes bust. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/03\/26\/bankrupt-radioshack-wants-to-sell-off-user-data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust\/ 2015.  A. Peterson. Bankrupt radioshack wants to sell off user data. but the bigger risk is if a facebook or google goes bust. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2015\/03\/26\/bankrupt-radioshack-wants-to-sell-off-user-data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust\/ 2015."},{"key":"e_1_3_2_1_30_1","unstructured":"Ratatype. Average typing speed infographic. http:\/\/www.ratatype.com\/learn\/average-typing-speed\/.  Ratatype. Average typing speed infographic. http:\/\/www.ratatype.com\/learn\/average-typing-speed\/."},{"key":"e_1_3_2_1_31_1","unstructured":"M. Richtel. F.t.c. moves to halt sale of database at toysmart. http:\/\/www.nytimes.com\/2000\/07\/11\/business\/ftc-moves-to-halt-sale-of-database-at-toysmart.html 2000.  M. Richtel. F.t.c. moves to halt sale of database at toysmart. http:\/\/www.nytimes.com\/2000\/07\/11\/business\/ftc-moves-to-halt-sale-of-database-at-toysmart.html 2000."},{"key":"e_1_3_2_1_32_1","unstructured":"G. M. Robert-Jan Bartunek Philip Blenkinsop. Eu fines facebook 110 million euros over whatsapp deal. http:\/\/www.reuters.com\/article\/us-eu-facebook-antitrust-idUSKCN18E0LA 2017.  G. M. Robert-Jan Bartunek Philip Blenkinsop. Eu fines facebook 110 million euros over whatsapp deal. http:\/\/www.reuters.com\/article\/us-eu-facebook-antitrust-idUSKCN18E0LA 2017."},{"key":"e_1_3_2_1_33_1","volume-title":"Whitepaper","author":"Rowlands S.","year":"2014","unstructured":"S. Rowlands . Mobile messaging : War of the words . Whitepaper , 2014 . S. Rowlands. Mobile messaging: War of the words. Whitepaper, 2014."},{"key":"e_1_3_2_1_34_1","volume-title":"Going bankrupt with your personal data. https:\/\/www.teachprivacy.com\/going-bankrupt-with-your-personal-data\/","author":"Solove D.","year":"2015","unstructured":"D. Solove . Going bankrupt with your personal data. https:\/\/www.teachprivacy.com\/going-bankrupt-with-your-personal-data\/ , 2015 . D. Solove. Going bankrupt with your personal data. https:\/\/www.teachprivacy.com\/going-bankrupt-with-your-personal-data\/, 2015."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12280-9_9"},{"key":"e_1_3_2_1_38_1","unstructured":"B. Wellington. The dnsjava project. http:\/\/www.xbill.org\/dnsjava\/ 2002.  B. Wellington. The dnsjava project. http:\/\/www.xbill.org\/dnsjava\/ 2002."},{"key":"e_1_3_2_1_39_1","unstructured":"J. I. Wong. Here's how often apple google and others handed over data when the us government asked for it. https:\/\/qz.com\/620423\/heres-how-often-apple-google-and-others-handed-over-data-when-the-us-government-asked-for-it\/ 2016.  J. I. Wong. Here's how often apple google and others handed over data when the us government asked for it. https:\/\/qz.com\/620423\/heres-how-often-apple-google-and-others-handed-over-data-when-the-us-government-asked-for-it\/ 2016."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.149"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:05Z","timestamp":1750210745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196496"}},"subtitle":["How to Privately Discover your Friends on the Internet"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":38,"alternative-id":["10.1145\/3196494.3196496","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196496","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}