{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:54:55Z","timestamp":1775145295162,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fondazione Cassa di Risparmio di Padova e Rovigo (CARIPARO)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297430","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"1484-1491","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Mind your wallet's privacy"],"prefix":"10.1145","author":[{"given":"Fabio","family":"Aiolli","sequence":"first","affiliation":[{"name":"University of Padua, Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Italy"}]},{"given":"Ankit","family":"Gangwal","sequence":"additional","affiliation":[{"name":"University of Padua, Italy"}]},{"given":"Mirko","family":"Polato","sequence":"additional","affiliation":[{"name":"University of Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939929"},{"key":"e_1_3_2_1_2_1","volume-title":"Nino Vincenzo Verde, and Antonio Villani.","author":"Ateniese Giuseppe","year":"2015","unstructured":"Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, and Antonio Villani. 2015. No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. In Springer Network and System Security (NSS), LNCS, Vol. 9408. 46--59."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677048"},{"key":"e_1_3_2_1_9_1","volume-title":"NetworkProfiler: Towards Automatic Fingerprinting of Android Apps. In 32nd IEEE International Conference on Computer Communications (INFOCOM). 809--817","author":"Dai Shuaifu","year":"2013","unstructured":"Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, and Dawn Song. 2013. NetworkProfiler: Towards Automatic Fingerprinting of Android Apps. In 32nd IEEE International Conference on Computer Communications (INFOCOM). 809--817."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879176"},{"key":"e_1_3_2_1_12_1","volume-title":"14th IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS). 1--4.","author":"Ham Hyo","year":"2012","unstructured":"Hyo Ham and Mi Choi. 2012. Applicaion-level Traffic Analysis of Smartphone Users using Embedded Agents. In 14th IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS). 1--4."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765299.1765312"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/844379.844681"},{"key":"e_1_3_2_1_17_1","volume-title":"13th IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS). 1--7.","author":"Lee Sang-Woo","year":"2011","unstructured":"Sang-Woo Lee, Jun-Sang Park, Hyun-Shin Lee, and Myung-Sup Kim. 2011. A Study on Smartphone Traffic Analysis. In 13th IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS). 1--7."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.247"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2491700"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371972"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3027019.3027026"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/975545"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462099"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/211359"},{"key":"e_1_3_2_1_29_1","volume-title":"3rd IEEE Communications and Network Security (CNS). 433--441.","author":"Wang Qinglong","unstructured":"Qinglong Wang, Amir Yahyavi, Bettina Kemme, and Wenbo He. 2015. I Know What You Did on Your Smartphone: Inferring App Usage over Encrypted Data Traffic. In 3rd IEEE Communications and Network Security (CNS). 433--441."},{"key":"e_1_3_2_1_30_1","volume-title":"Analysis of Smartphone Traffic with MapReduce. In 22nd IEEE Wireless and Optical Communication Conference (WOCC). 394--398","author":"Yang Jie","year":"2013","unstructured":"Jie Yang, Shuo Zhang, Xinyu Zhang, Jun Liu, and Gang Cheng. 2013. Analysis of Smartphone Traffic with MapReduce. In 22nd IEEE Wireless and Optical Communication Conference (WOCC). 394--398."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516661"}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","location":"Limassol Cyprus","acronym":"SAC '19","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297430","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:15Z","timestamp":1750208535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297430"}},"subtitle":["identifying Bitcoin wallet apps and user's actions through network traffic analysis"],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":30,"alternative-id":["10.1145\/3297280.3297430","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297430","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}