{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:42:27Z","timestamp":1767339747660,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,12]]},"DOI":"10.1145\/3360774.3360777","type":"proceedings-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T14:56:00Z","timestamp":1580741760000},"page":"444-453","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Saving private addresses"],"prefix":"10.1145","author":[{"given":"Guillaume","family":"Celosia","sequence":"first","affiliation":[{"name":"Univ Lyon, Villeurbanne, France"}]},{"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[{"name":"Univ Lyon, Villeurbanne, France"}]}],"member":"320","published-online":{"date-parts":[[2020,2,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2014.6847097"},{"key":"e_1_3_2_1_2_1","unstructured":"Apple. 2019. iOS Security - iOS 12.3. https:\/\/www.apple.com\/business\/site\/docs\/iOS_Security_Guide.pdf Accessed: 2019-08-30.  Apple. 2019. iOS Security - iOS 12.3. https:\/\/www.apple.com\/business\/site\/docs\/iOS_Security_Guide.pdf Accessed: 2019-08-30."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0036"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583443"},{"volume-title":"Radha Govira Laha, and Jogabrata Roy","year":"1967","author":"Chakravarti Indra Mohan","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.04.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"volume-title":"Protecting Privacy of BLE Device Users. In 25th USENIX Security Symposium (USENIX Security 16)","year":"2016","author":"Fawaz Kassem","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Ben Greenstein Ramakrishna Gummadi Jeffrey Pang Mike Y Chen Tadayoshi Kohno Srinivasan Seshan and David Wetherall. 2007. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era.. In HotOS.  Ben Greenstein Ramakrishna Gummadi Jeffrey Pang Mike Y Chen Tadayoshi Kohno Srinivasan Seshan and David Wetherall. 2007. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era.. In HotOS."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-6425-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NEXTCOMP.2017.8016185"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389121"},{"volume-title":"Statistics to use: Kolmogorov-Smirnov test","year":"1996","author":"Kirkman TW","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Scott Lester. 2015. The Emergence of Bluetooth Low Energy. (2015). https:\/\/www.contextis.com\/blog\/the-emergence-of-bluetooth-low-energy Accessed: 2019-08-30.  Scott Lester. 2015. The Emergence of Bluetooth Low Energy. (2015). https:\/\/www.contextis.com\/blog\/the-emergence-of-bluetooth-low-energy Accessed: 2019-08-30."},{"key":"e_1_3_2_1_15_1","unstructured":"Scott Lester and Paul Stone. 2016. Bluetooth LE - Increasingly popular but still not very private. (2016). https:\/\/www.contextis.com\/en\/blog\/bluetooth-le-increasingly-popular-still-not-very-private Accessed: 2019-08-30.  Scott Lester and Paul Stone. 2016. Bluetooth LE - Increasingly popular but still not very private. (2016). https:\/\/www.contextis.com\/en\/blog\/bluetooth-le-increasingly-popular-still-not-very-private Accessed: 2019-08-30."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0054"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991098"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939930"},{"key":"e_1_3_2_1_19_1","unstructured":"Microsoft. 2019. Microsoft Connected Devices Platform Protocol Version 3. https:\/\/docs.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-cdp\/f5a15c56-ac3a-48f9-8c51-07b2eadbe9b4 Accessed: 2019-08-30.  Microsoft. 2019. Microsoft Connected Devices Platform Protocol Version 3. https:\/\/docs.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-cdp\/f5a15c56-ac3a-48f9-8c51-07b2eadbe9b4 Accessed: 2019-08-30."},{"volume-title":"Bluetooth tracking of humans in an indoor environment: An application to shopping mall visits. Applied geography 78","year":"2017","author":"Oosterlinck Dieter","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Tryst: The Case for Confidential Service Discovery","volume":"2","author":"Pang Jeffrey","year":"2007","journal-title":"HotNets"},{"key":"e_1_3_2_1_22_1","unstructured":"Bluetooth SIG. 2010. Bluetooth Core Specification v4.0. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=456433 Accessed: 2019-08-30.  Bluetooth SIG. 2010. Bluetooth Core Specification v4.0. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=456433 Accessed: 2019-08-30."},{"key":"e_1_3_2_1_23_1","unstructured":"Bluetooth SIG. 2019. Bluetooth Core Specification Supplement v8.0. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=457081 Accessed: 2019-08-30.  Bluetooth SIG. 2019. Bluetooth Core Specification Supplement v8.0. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=457081 Accessed: 2019-08-30."},{"key":"e_1_3_2_1_24_1","unstructured":"Bluetooth SIG. 2019. Bluetooth Core Specification v5.1. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=457080 Accessed: 2019-08-30.  Bluetooth SIG. 2019. Bluetooth Core Specification v5.1. https:\/\/www.bluetooth.org\/docman\/handlers\/downloaddoc.ashx?doc_id=457080 Accessed: 2019-08-30."},{"volume-title":"Bluetooth Market Update","year":"2019","author":"Bluetooth SIG.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897883"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_15"},{"key":"e_1_3_2_1_28_1","first-page":"937","article-title":"Privacy-aware personalized content for the smart home","volume":"14","author":"Zomet Asaf","year":"2016","journal-title":"US Patent App."}],"event":{"name":"MobiQuitous: Computing, Networking and Services","acronym":"MobiQuitous","location":"Houston Texas USA"},"container-title":["Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3360777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360774.3360777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:36Z","timestamp":1750203876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3360777"}},"subtitle":["an analysis of privacy issues in the bluetooth-low-energy advertising mechanism"],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":28,"alternative-id":["10.1145\/3360774.3360777","10.1145\/3360774"],"URL":"https:\/\/doi.org\/10.1145\/3360774.3360777","relation":{},"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"2020-02-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}