{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T15:23:25Z","timestamp":1776525805913,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T00:00:00Z","timestamp":1649116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,5]]},"DOI":"10.1145\/3517208.3523757","type":"proceedings-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T22:12:16Z","timestamp":1648505536000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Where the sidewalk ends"],"prefix":"10.1145","author":[{"given":"Tess","family":"Despres","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Shishir","family":"Patil","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Alvin","family":"Tan","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Jean-Luc","family":"Watson","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Prabal","family":"Dutta","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2022,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Find my network. https:\/\/developer.apple.com\/find-my\/. Accessed: 09.24.2021.  Find my network. https:\/\/developer.apple.com\/find-my\/. Accessed: 09.24.2021."},{"key":"e_1_3_2_1_2_1","volume-title":"CBS News","year":"2013","unstructured":"U.k. bars trash cans from tracking people with wi-fi . CBS News , 2013 . U.k. bars trash cans from tracking people with wi-fi. CBS News, 2013."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/m.media-amazon.com\/images\/G\/01\/sidewalk\/final_privacy_security_whitepaper.pdf","author":"Amazon","year":"2021","unstructured":"Amazon sidewalk privacy and security whitepaper. https:\/\/m.media-amazon.com\/images\/G\/01\/sidewalk\/final_privacy_security_whitepaper.pdf , 2021 . Amazon sidewalk privacy and security whitepaper. https:\/\/m.media-amazon.com\/images\/G\/01\/sidewalk\/final_privacy_security_whitepaper.pdf, 2021."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302376"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2018.00047"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31500-9_6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEIMA.2006.344927"},{"key":"e_1_3_2_1_8_1","volume-title":"Exposure notification - bluetooth specification. shttps:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ExposureNotification-BluetoothSpecificationv1.2.pdf?1","year":"2020","unstructured":"Apple\/Google. Exposure notification - bluetooth specification. shttps:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ExposureNotification-BluetoothSpecificationv1.2.pdf?1 , 2020 . Apple\/Google. Exposure notification - bluetooth specification. shttps:\/\/covid19-static.cdn-apple.com\/applications\/covid19\/current\/static\/contact-tracing\/pdf\/ExposureNotification-BluetoothSpecificationv1.2.pdf?1, 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"On locational privacy, and how to avoid losing it forever. https:\/\/www.eff.org\/wp\/locational-privacy","author":"Blumberg Andrew","year":"2009","unstructured":"Andrew Blumberg and Peter Eckersley . On locational privacy, and how to avoid losing it forever. https:\/\/www.eff.org\/wp\/locational-privacy , 2009 . Andrew Blumberg and Peter Eckersley. On locational privacy, and how to avoid losing it forever. https:\/\/www.eff.org\/wp\/locational-privacy, 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_15_1","first-page":"1775","volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21)","author":"Eskandarian Saba","year":"2021","unstructured":"Saba Eskandarian , Henry Corrigan-Gibbs , Matei Zaharia , and Dan Boneh . Express: Lowering the cost of metadata-hiding communication with cryptographic privacy . In 30th {USENIX} Security Symposium ({USENIX} Security 21) , pages 1775 -- 1792 , 2021 . Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh. Express: Lowering the cost of metadata-hiding communication with cryptographic privacy. In 30th {USENIX} Security Symposium ({USENIX} Security 21), pages 1775--1792, 2021."},{"key":"e_1_3_2_1_16_1","first-page":"19","article-title":"How stores use your phone's wifi to track your shopping habits","author":"Fung Brian","year":"2013","unstructured":"Brian Fung . How stores use your phone's wifi to track your shopping habits . The Washington Post , 19 , 2013 . Brian Fung. How stores use your phone's wifi to track your shopping habits. The Washington Post, 19, 2013.","journal-title":"The Washington Post"},{"key":"e_1_3_2_1_17_1","volume-title":"Helium: A decentralized wireless network","author":"Haleem Amir","year":"2018","unstructured":"Amir Haleem , Andrew Allen , Andrew Thompson , Marc Nijdam , and Rahul Garg . Helium: A decentralized wireless network . 2018 . Amir Haleem, Andrew Allen, Andrew Thompson, Marc Nijdam, and Rahul Garg. Helium: A decentralized wireless network. 2018."},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Participatory air pollution monitoring using smartphones","volume":"1","author":"Hasenfratz David","year":"2012","unstructured":"David Hasenfratz , Olga Saukh , Silvan Sturzenegger , Lothar Thiele , Participatory air pollution monitoring using smartphones . Mobile Sensing , 1 : 1 -- 5 , 2012 . David Hasenfratz, Olga Saukh, Silvan Sturzenegger, Lothar Thiele, et al. Participatory air pollution monitoring using smartphones. Mobile Sensing, 1:1--5, 2012.","journal-title":"Mobile Sensing"},{"key":"e_1_3_2_1_19_1","first-page":"497","volume-title":"Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide? In 27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Hassan Wajih Ul","year":"2018","unstructured":"Wajih Ul Hassan , Saad Hussain , and Adam Bates . Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide? In 27th {USENIX} Security Symposium ({USENIX} Security 18) , pages 497 -- 512 , 2018 . Wajih Ul Hassan, Saad Hussain, and Adam Bates. Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide? In 27th {USENIX} Security Symposium ({USENIX} Security 18), pages 497--512, 2018."},{"key":"e_1_3_2_1_20_1","volume-title":"Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system. arXiv preprint arXiv:2103.02282","author":"Heinrich Alexander","year":"2021","unstructured":"Alexander Heinrich , Milan Stute , Tim Kornhuber , and Matthias Hollick . Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system. arXiv preprint arXiv:2103.02282 , 2021 . Alexander Heinrich, Milan Stute, Tim Kornhuber, and Matthias Hollick. Who can find my devices? security and privacy of apple's crowd-sourced bluetooth location tracking system. arXiv preprint arXiv:2103.02282, 2021."},{"key":"e_1_3_2_1_21_1","volume-title":"Simplifying wireless iot gateway deployment. https:\/\/machineq.com\/post\/simplifying-wireless-iot-gateway-deployment","author":"Hildenbrand Jim","year":"2019","unstructured":"Jim Hildenbrand . Simplifying wireless iot gateway deployment. https:\/\/machineq.com\/post\/simplifying-wireless-iot-gateway-deployment , 2019 . Jim Hildenbrand. Simplifying wireless iot gateway deployment. https:\/\/machineq.com\/post\/simplifying-wireless-iot-gateway-deployment, 2019."},{"key":"e_1_3_2_1_22_1","volume-title":"Four attorneys general claim google secretly tracked people. https:\/\/www.nytimes.com\/2022\/01\/24\/technology\/google-location-services-lawsuit.html","author":"Kang Cecilia","year":"2022","unstructured":"Cecilia Kang . Four attorneys general claim google secretly tracked people. https:\/\/www.nytimes.com\/2022\/01\/24\/technology\/google-location-services-lawsuit.html , 2022 . Cecilia Kang. Four attorneys general claim google secretly tracked people. https:\/\/www.nytimes.com\/2022\/01\/24\/technology\/google-location-services-lawsuit.html, 2022."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"e_1_3_2_1_24_1","volume-title":"Riffle: An efficient communication system with strong anonymity","author":"Kwon Albert Hyukjae","year":"2015","unstructured":"Albert Hyukjae Kwon , David Lazar , Srinivas Devadas , and Bryan Ford . Riffle: An efficient communication system with strong anonymity . 2015 . Albert Hyukjae Kwon, David Lazar, Srinivas Devadas, and Bryan Ford. Riffle: An efficient communication system with strong anonymity. 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium","author":"Lentz Matthew","year":"2014","unstructured":"Matthew Lentz , Viktor Erd\u00e9lyi , Paarijaat Aditya , Elaine Shi , Peter Druschel , and Bobby Bhattacharjee . Sddr : Light-weight, secure mobile encounters . In USENIX Security Symposium , 2014 . Matthew Lentz, Viktor Erd\u00e9lyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, and Bobby Bhattacharjee. Sddr: Light-weight, secure mobile encounters. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2604383"},{"key":"e_1_3_2_1_27_1","volume-title":"Probabilistic routing in intermittently connected networks. ACM SIGMOBILE mobile computing and communications review, 7(3):19--20","author":"Lindgren Anders","year":"2003","unstructured":"Anders Lindgren , Avri Doria , and Olov Schel\u00e9n . Probabilistic routing in intermittently connected networks. ACM SIGMOBILE mobile computing and communications review, 7(3):19--20 , 2003 . Anders Lindgren, Avri Doria, and Olov Schel\u00e9n. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE mobile computing and communications review, 7(3):19--20, 2003."},{"key":"e_1_3_2_1_28_1","volume-title":"CCS","author":"Manweiler Justin","year":"2009","unstructured":"Justin Manweiler , Ryan Scudellari , and Landon P. Cox . Smile: encounter-based trust for mobile social services . In CCS , 2009 . Justin Manweiler, Ryan Scudellari, and Landon P. Cox. Smile: encounter-based trust for mobile social services. In CCS, 2009."},{"key":"e_1_3_2_1_29_1","volume-title":"Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol. arXiv preprint arXiv:1904.10600","author":"Martin Jeremy","year":"2019","unstructured":"Jeremy Martin , Douglas Alpuche , Kristina Bodeman , Lamont Brown , Ellis Fenske , Lucas Foppe , Travis Mayberry , Erik C Rye , Brandon Sipes , and Sam Teplov . Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol. arXiv preprint arXiv:1904.10600 , 2019 . Jeremy Martin, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik C Rye, Brandon Sipes, and Sam Teplov. Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol. arXiv preprint arXiv:1904.10600, 2019."},{"key":"e_1_3_2_1_30_1","volume-title":"A study of mac address randomization in mobile devices and when it fails. arXiv preprint arXiv:1703.02874","author":"Martin Jeremy","year":"2017","unstructured":"Jeremy Martin , Travis Mayberry , Collin Donahue , Lucas Foppe , Lamont Brown , Chadwick Riggins , Erik C Rye , and Dane Brown . A study of mac address randomization in mobile devices and when it fails. arXiv preprint arXiv:1703.02874 , 2017 . Jeremy Martin, Travis Mayberry, Collin Donahue, Lucas Foppe, Lamont Brown, Chadwick Riggins, Erik C Rye, and Dane Brown. A study of mac address randomization in mobile devices and when it fails. arXiv preprint arXiv:1703.02874, 2017."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061994"},{"key":"e_1_3_2_1_32_1","volume-title":"Discontinuing support for android nearby notifications. https:\/\/android-developers.googleblog.com\/2018\/10\/discontinuing-support-for-android.html","author":"Ritesh Nayak M","year":"2018","unstructured":"Nayak M Ritesh . Discontinuing support for android nearby notifications. https:\/\/android-developers.googleblog.com\/2018\/10\/discontinuing-support-for-android.html , 2018 . Nayak M Ritesh. Discontinuing support for android nearby notifications. https:\/\/android-developers.googleblog.com\/2018\/10\/discontinuing-support-for-android.html, 2018."},{"key":"e_1_3_2_1_33_1","volume-title":"Lora and lorawan. https:\/\/lora-developers.semtech.com\/documentation\/tech-papers-and-guides\/lora-and-lorawan\/","year":"2021","unstructured":"Semtech. Lora and lorawan. https:\/\/lora-developers.semtech.com\/documentation\/tech-papers-and-guides\/lora-and-lorawan\/ , 2021 . Semtech. Lora and lorawan. https:\/\/lora-developers.semtech.com\/documentation\/tech-papers-and-guides\/lora-and-lorawan\/, 2021."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203354"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3421461"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.271"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_3_2_1_39_1","volume-title":"How tile works. https:\/\/www.thetileapp.com\/en-us\/how-it-works","year":"2021","unstructured":"Tile. How tile works. https:\/\/www.thetileapp.com\/en-us\/how-it-works , 2021 . Tile. How tile works. https:\/\/www.thetileapp.com\/en-us\/how-it-works, 2021."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3328614"},{"key":"e_1_3_2_1_41_1","volume-title":"Epidemic routing for partially-connected ad hoc networks","author":"Vahdat Amin","year":"2009","unstructured":"Amin Vahdat . Epidemic routing for partially-connected ad hoc networks . 2009 . Amin Vahdat. Epidemic routing for partially-connected ad hoc networks. 2009."},{"key":"e_1_3_2_1_42_1","volume-title":"The computer for the 21st century. Scientific american, 265(3)","author":"Weiser Mark","year":"1991","unstructured":"Mark Weiser . The computer for the 21st century. Scientific american, 265(3) , 1991 . Mark Weiser. The computer for the 21st century. Scientific american, 265(3), 1991."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526816"}],"event":{"name":"EuroSys '22: Seventeenth European Conference on Computer Systems","location":"Rennes France","acronym":"EuroSys '22","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 15th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517208.3523757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517208.3523757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:29Z","timestamp":1750188689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517208.3523757"}},"subtitle":["privacy of opportunistic backhaul"],"short-title":[],"issued":{"date-parts":[[2022,4,5]]},"references-count":43,"alternative-id":["10.1145\/3517208.3523757","10.1145\/3517208"],"URL":"https:\/\/doi.org\/10.1145\/3517208.3523757","relation":{},"subject":[],"published":{"date-parts":[[2022,4,5]]},"assertion":[{"value":"2022-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}