{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:23Z","timestamp":1750307063457,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T00:00:00Z","timestamp":1348185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,21]]},"DOI":"10.1145\/2371664.2371683","type":"proceedings-article","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T23:48:43Z","timestamp":1348616923000},"page":"95-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy and secrecy in ubiquitous text messaging"],"prefix":"10.1145","author":[{"given":"Diogo","family":"Marques","sequence":"first","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Lu\u00eds","family":"Duarte","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]},{"given":"Lu\u00eds","family":"Carri\u00e7o","sequence":"additional","affiliation":[{"name":"University of Lisbon, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2012,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.23"},{"issue":"6","key":"e_1_3_2_1_2_1","first-page":"1147","article-title":"Review of mobile short message service security issues and techniques towards the solution","volume":"6","author":"Medina A.","year":"2011","unstructured":"Medina , A. . Review of mobile short message service security issues and techniques towards the solution . In Scientific Research and Essays Vol. 6 ( 6 ), pp. 1147 -- 1165 , 18 March , 2011 . Medina, A. et al. Review of mobile short message service security issues and techniques towards the solution. In Scientific Research and Essays Vol. 6(6), pp. 1147--1165, 18 March, 2011.","journal-title":"Scientific Research and Essays"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056958"},{"key":"e_1_3_2_1_4_1","volume-title":"Themes in mobile telephony Final Report of the COST 248 Home and Work group. Haddon, L (ed).","author":"Ling R.","year":"1997","unstructured":"Ling , R. ' One can talk about common manners!': the use of mobile telephones in inappropriate situations . In Themes in mobile telephony Final Report of the COST 248 Home and Work group. Haddon, L (ed). 1997 . Ling, R. 'One can talk about common manners!': the use of mobile telephones in inappropriate situations. In Themes in mobile telephony Final Report of the COST 248 Home and Work group. Haddon, L (ed). 1997."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2004.04.001"},{"key":"e_1_3_2_1_6_1","unstructured":"Ananova 2003. Young people could not live without their mobiles available: http:\/\/www.ananova.com\/news\/story\/sm_779110.html?menuZ.  Ananova 2003. Young people could not live without their mobiles available: http:\/\/www.ananova.com\/news\/story\/sm_779110.html?menuZ."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851638"}],"event":{"name":"MobileHCI '12: 14th International Conference on Human Computer Interaction with Mobile Devices and Services","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Francisco California USA","acronym":"MobileHCI '12"},"container-title":["Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371664.2371683","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2371664.2371683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:18Z","timestamp":1750238478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371664.2371683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,21]]},"references-count":7,"alternative-id":["10.1145\/2371664.2371683","10.1145\/2371664"],"URL":"https:\/\/doi.org\/10.1145\/2371664.2371683","relation":{},"subject":[],"published":{"date-parts":[[2012,9,21]]},"assertion":[{"value":"2012-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}