{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:38:23Z","timestamp":1742985503066,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031092336"},{"type":"electronic","value":"9783031092343"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-09234-3_19","type":"book-chapter","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T07:23:45Z","timestamp":1655450625000},"page":"376-395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Probing for Passwords \u2013 Privacy Implications of SSIDs in Probe Requests"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7457-2181","authenticated-orcid":false,"given":"Johanna","family":"Ansohn McDougall","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8187-5447","authenticated-orcid":false,"given":"Christian","family":"Burkert","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6334-6277","authenticated-orcid":false,"given":"Daniel","family":"Demmler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7887-5307","authenticated-orcid":false,"given":"Monina","family":"Schwarz","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Hubbe","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Federrath","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,18]]},"reference":[{"key":"19_CR1","unstructured":"Acar, C.: Whitepaper: Smart Store (2018). https:\/\/www.ehi.org\/de\/studien\/whitepaper-smart-store\/"},{"key":"19_CR2","unstructured":"Apple Inc.: Use private Wi-Fi addresses on iPhone, iPad, iPod touch, and Apple Watch. https:\/\/support.apple.com\/en-us\/HT211227"},{"key":"19_CR3","unstructured":"Apple Inc.: Apple Platform Security (2021). https:\/\/manuals.info.apple.com\/MANUALS\/1000\/MA1902\/en_US\/apple-platform-security-guide.pdf"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Bernardos, C.J., Zuniga, J.C., O\u2019Hanlon, P.: Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless Internet. In: IEEE Conference on Standards for Communications and Networking (CSCN), pp. 193\u2013198. IEEE (2015). https:\/\/doi.org\/10.1109\/CSCN.2015.7390443, http:\/\/ieeexplore.ieee.org\/document\/7390443\/","DOI":"10.1109\/CSCN.2015.7390443"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.pmcj.2013.04.001","volume":"11","author":"M Cunche","year":"2018","unstructured":"Cunche, M., Kaafar, M.A., Boreli, R.: Linking wireless devices using information contained in Wi-Fi probe requests. Pervas. Mobile Comput. 11, 56\u201369 (2018)","journal-title":"Pervas. Mobile Comput."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Dageli\u0107, A., Perkovi\u0107, T., \u010cagalj, M.: Location privacy and changes in WiFi probe request based connection protocols usage through years. In: International Conference on Smart and Sustainable Technologies (SpliTech), pp. 1\u20135. IEEE (2019)","DOI":"10.23919\/SpliTech.2019.8783167"},{"key":"19_CR7","unstructured":"Harkins, D.: Wi-Fi CERTIFIED Enhanced Open\u2122: Transparent Wi-Fi\u00ae protections without complexity. https:\/\/www.wi-fi.org\/beacon\/dan-harkins\/wi-fi-certified-enhanced-open-transparent-wi-fi-protections-without-complexity"},{"key":"19_CR8","unstructured":"Deutscher Bundestag: Datenschutzrechtliche Zul\u00e4ssigkeit des WLAN-Trackings (2021). https:\/\/www.bundestag.de\/resource\/blob\/538890\/3dfae197d2c930693aa16d1619204f58\/WD-3-206-17-pdf-data.pdf"},{"key":"19_CR9","unstructured":"Ebbecke, P.: Protected Management Frames enhance Wi-Fi Network Security (2020). https:\/\/www.wi-fi.org\/beacon\/philipp-ebbecke\/protected-management-frames-enhance-wi-fi-network-security"},{"key":"19_CR10","unstructured":"European Union: Regulation (EU) 2016\/679 - general data protection regulation. Official J. Eur. Union L119, 1\u201388 (2016). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Fenske, E., Brown, D., Martin, J., Mayberry, T., Ryan, P., Rye, E.C.: Three years later: a study of MAC address randomization in mobile devices and when it succeeds. In: PETS 2021, pp. 164\u2013181 (2021)","DOI":"10.2478\/popets-2021-0042"},{"key":"19_CR12","doi-asserted-by":"publisher","unstructured":"Freudiger, J.: How talkative is your mobile device? An experimental study of Wi-Fi probe requests. In: WiSec 2015. ACM (2015). https:\/\/doi.org\/10.1145\/2766498.2766517","DOI":"10.1145\/2766498.2766517"},{"key":"19_CR13","unstructured":"Google Android Documentation: Implementing MAC Randomization (2021). https:\/\/source.android.com\/devices\/tech\/connect\/wifi-mac-randomization"},{"key":"19_CR14","unstructured":"Google Android Documentation: MAC Randomization Behavior (2022). https:\/\/source.android.com\/devices\/tech\/connect\/wifi-mac-randomization-behavior"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-35055-0_3","volume-title":"Secure IT Systems","author":"F Goovaerts","year":"2019","unstructured":"Goovaerts, F., Acar, G., Galvez, R., Piessens, F., Vanhoef, M.: Improving privacy through fast passive Wi-Fi scanning. In: Askarov, A., Hansen, R.R., Rafnsson, W. (eds.) NordSec 2019. LNCS, vol. 11875, pp. 37\u201352. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35055-0_3"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Gu, X., Wu, W., Gu, X., Ling, Z., Yang, M., Song, A.: Probe request based device identification attack and defense. Sensors 20(16), 4620 (2020). https:\/\/doi.org\/10.3390\/s20164620, https:\/\/www.mdpi.com\/1424-8220\/20\/16\/4620","DOI":"10.3390\/s20164620"},{"key":"19_CR17","doi-asserted-by":"publisher","unstructured":"Harkins, D., Kumari, W.A.: Opportunistic Wireless Encryption. RFC 8110, March 2017. https:\/\/doi.org\/10.17487\/RFC8110, https:\/\/rfc-editor.org\/rfc\/rfc8110.txt","DOI":"10.17487\/RFC8110"},{"key":"19_CR18","unstructured":"IEEE: IEEE STD 802.11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2020). https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=9363693"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Martin, J., et al.: A study of MAC address randomization in mobile devices and when it fails. In: PETS 2017, vol. 4, pp. 268\u2013286 (2017)","DOI":"10.1515\/popets-2017-0054"},{"key":"19_CR20","unstructured":"Martinez, S.: Update add network dialog to not make networks hidden by default (2018). https:\/\/android.googlesource.com\/platform\/packages\/apps\/Settings\/+\/8bc3fa0649a3ecff5e42fb0d14ddb8ff6f7f7507"},{"key":"19_CR21","unstructured":"McElhearn, K.: How to Remove Wi-Fi Networks from Your Mac and iOS Device. The Mac Security Blog (2021). https:\/\/www.intego.com\/mac-security-blog\/how-to-remove-wi-fi-networks-from-your-mac-and-ios-device\/"},{"key":"19_CR22","unstructured":"Pang, J., Seshan, S.: Tryst: the case for confidential service discovery. In: HotNets 2007 (2007)"},{"key":"19_CR23","unstructured":"Post, T.: Scharfe Kritik an Frequenzmessung. Kieler Nachrichten (2017). https:\/\/www.kn-online.de\/Lokales\/Eckernfoerde\/Datenschutz-Diskussion-um-WLAN-Tracking-in-Eckernfoerder-Innenstadt"},{"key":"19_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2017.12.012","volume":"117","author":"AE Redondi","year":"2018","unstructured":"Redondi, A.E., Cesana, M.: Building up knowledge through passive WiFi probes. Comput. Commun. 117, 1\u201312 (2018)","journal-title":"Comput. Commun."},{"key":"19_CR25","doi-asserted-by":"publisher","unstructured":"Schepers, D., Ranganathan, A., Vanhoef, M.: Let numbers tell the tale: measuring security trends in Wi-Fi networks and best practices. In: WiSec 2021, pp. 100\u2013105. ACM (2021). https:\/\/doi.org\/10.1145\/3448300.3468286","DOI":"10.1145\/3448300.3468286"},{"key":"19_CR26","unstructured":"statcounter: Mobile & Tablet Android Version Market Share Worldwide - December 2021 (2021). https:\/\/gs.statcounter.com\/os-version-market-share\/android\/mobile-tablet\/worldwide#monthly-202112-202112-bar"},{"key":"19_CR27","unstructured":"statcounter: Mobile & Tablet iOS Version Market Share Worldwide - December 2021 (2021). https:\/\/gs.statcounter.com\/ios-version-market-share\/mobile-tablet\/worldwide\/#monthly-202112-202112-bar"},{"key":"19_CR28","unstructured":"statcounter: Mobile operating system market share worldwide (2021). https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide"},{"key":"19_CR29","unstructured":"Struever, A.: Vorteile und Nachteile WLAN-Tracking - Ist WLAN-Tracking DSGVO-Konform? (2019). https:\/\/www.expocloud.com\/de\/blog\/vorteile-und-nachteile-wlan-tracking-wifi-tracking"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Tan, J., Chan, S.H.G.: Efficient association of Wi-Fi probe requests under MAC address randomization. In: INFOCOM 2021, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488769"},{"key":"19_CR31","unstructured":"Unabh\u00e4ngiges Landeszentrum f\u00fcr Datenschutz: 5.4.8 - Offline-Tracking\/Ortung von Mobiltelefonen in Fu\u00dfg\u00e4ngerzone. Unabh\u00e4ngiges Landeszentrum f\u00fcr Datenschutz (2021). https:\/\/www.datenschutzzentrum.de\/tb\/tb37\/kap05.html"},{"key":"19_CR32","doi-asserted-by":"publisher","unstructured":"Vanhoef, M., Matte, C., Cunche, M., Cardoso, L.S., Piessens, F.: Why MAC address randomization is not enough: an analysis of Wi-Fi network discovery mechanisms. In: Asia CCS 2016, pp. 413\u2013424. ACM (2016). https:\/\/doi.org\/10.1145\/2897845.2897883","DOI":"10.1145\/2897845.2897883"},{"issue":"1","key":"19_CR33","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.1007\/s10586-018-1737-7","volume":"22","author":"F Zhao","year":"2018","unstructured":"Zhao, F., Shi, W., Gan, Y., Peng, Z., Luo, X.: A localization and tracking scheme for target gangs based on big data of Wi-Fi locations. Clust. Comput. 22(1), 1679\u20131690 (2018). https:\/\/doi.org\/10.1007\/s10586-018-1737-7","journal-title":"Clust. Comput."},{"key":"19_CR34","unstructured":"Z\u00fa\u00f1iga, J.C., Bernardos, C.J., Andersdotter, A.: MAC address randomization. Technical report, IETF, July 2021. https:\/\/datatracker.ietf.org\/doc\/html\/draft-zuniga-mac-address-randomization-01"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09234-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T19:40:50Z","timestamp":1671478850000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09234-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031092336","9783031092343"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09234-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"18 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/acns2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"185","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the Workshops, 52 papers were submitted, from which 31 were accepted. Additionally they include 5 posters.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}