{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:47:09Z","timestamp":1725727629619},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642384004"},{"type":"electronic","value":"9783642384011"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38401-1_15","type":"book-chapter","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T04:53:08Z","timestamp":1369803188000},"page":"192-203","source":"Crossref","is-referenced-by-count":8,"title":["Spotique: A New Approach to Local Messaging"],"prefix":"10.1007","author":[{"given":"Manfred","family":"Sneps-Sneppe","sequence":"first","affiliation":[]},{"given":"Dmitry","family":"Namiot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"15_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/65.313011","volume":"8","author":"G. Schilit","year":"1994","unstructured":"Schilit, G., Theimer, B.: Disseminating Active Map Information to Mobile Hosts. IEEE Network\u00a08(5), 22\u201332 (1994)","journal-title":"IEEE Network"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Namiot, D., Sneps-Sneppe, M.: Context-aware data discovery. In: 2012 16th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 134\u2013141 (2012), doi:10.1109\/ICIN.2012.6376016","DOI":"10.1109\/ICIN.2012.6376016"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"\u0160ik\u0161nys, L., Thomsen, J., \u0160altenis, S., Yiu, M.: Private and Flexible Proximity Detection in Mobile Social Networks. In: 2010 Eleventh International Conference on Mobile Data Management (MDM), pp. 75\u201384 (2010)","DOI":"10.1109\/MDM.2010.43"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Mascetti, S., Bettini, C., Freni, D., Wang, X.S., Jajodia, S.: Privacy-aware proximity based services. In: MDM, pp. 31\u201340 (2009)","DOI":"10.1109\/MDM.2009.14"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11752967_9","volume-title":"Location- and Context-Awareness","author":"P. Ruppel","year":"2006","unstructured":"Ruppel, P., Treu, G., K\u00fcpper, A., Linnhoff-Popien, C.: Anonymous User Tracking for Location-Based Community Services. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol.\u00a03987, pp. 116\u2013133. Springer, Heidelberg (2006)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-32686-8_6","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networking","author":"D. Namiot","year":"2012","unstructured":"Namiot, D., Sneps-Sneppe, M.: Where Are They Now \u2013 Safe Location Sharing. In: Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN\/ruSMART 2012. LNCS, vol.\u00a07469, pp. 63\u201374. Springer, Heidelberg (2012)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N.: ProxiMate: Proximity-based Secure Pairing using Ambient Wireless Signals. In: MobiSys 2011 Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 211\u2013224 (2011), doi:10.1145\/1999995.2000016","DOI":"10.1145\/1999995.2000016"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Namiot, D., Schneps-Schneppe, M.: About location-aware mobile messages. In: International Conference and Exhibition on Next Generation Mobile Applications, Services and Technologies (NGMAST), September 14-16, pp. 48\u201353 (2011), doi:10.1109\/NGMAST.2011.19","DOI":"10.1109\/NGMAST.2011.19"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-75160-1_3","volume-title":"Location- and Context-Awareness","author":"J. Rekimoto","year":"2007","unstructured":"Rekimoto, J., Miyaki, T., Ishizawa, T.: LifeTag: WiFi-Based Continuous Location Logging for Life Pattern Analysis. In: Hightower, J., Schiele, B., Strang, T. (eds.) LoCA 2007. LNCS, vol.\u00a04718, pp. 35\u201349. Springer, Heidelberg (2007)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Y., Chawathe, Y., LaMarca, A., Krumm, J.: Accuracy characterization for metropolitan-scale Wi-Fi localization. In: ACM MobiSys (2005)","DOI":"10.1145\/1067170.1067195"},{"issue":"3&4","key":"15_CR11","first-page":"163","volume":"5","author":"D. Namiot","year":"2012","unstructured":"Namiot, D., Sneps-Sneppe, M.: Using Network Proximity for Context-aware Browsing. International Journal on Advances in Telecommunications\u00a05(3&4), 163\u2013172 (2012)","journal-title":"International Journal on Advances in Telecommunications"},{"key":"15_CR12","unstructured":"Gast, M.: 802.11 Wireless Networks: The Definitive Guide, 654 p. O\u2019Reilly Media, Inc. (2005)"},{"key":"15_CR13","unstructured":"Wi-Fi probe request, \n \n http:\/\/wiresharklab.blogspot.ru\/\n \n \n (retrieved: January 2013)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Musa, A., Eriksson, J.: Tracking Unmodified Smartphones Using Wi-Fi Monitors. In: SenSys 2012, Toronto, November 6-9 (2012)","DOI":"10.1145\/2426656.2426685"},{"key":"15_CR15","unstructured":"Lubelium routers, \n \n http:\/\/www.libelium.com\n \n \n (retrieved: January 2013)"},{"key":"15_CR16","unstructured":"Google Cloud Messaging, \n \n http:\/\/developer.android.com\/google\/gcm\/index.html\n \n \n (retrieved: January 2013)"},{"key":"15_CR17","unstructured":"Apple Push Notification Service, \n \n http:\/\/developer.apple.com\/library\/mac\/#documentation\/NetworkingInternet\/Conceptual\/RemoteNotificationsPG\/ApplePushService\/ApplePushService.html\n \n \n (retrieved: January 2012)"},{"key":"15_CR18","unstructured":"Microsoft Inc. Push Notifications Overview for Windows Phone, \n \n http:\/\/msdn.microsoft.com\/en-us\/library\/windowsphone\/develop\/ff402558v=vs.105.aspx\n \n \n (retrieved: January 2013)"},{"key":"15_CR19","unstructured":"Reserach In Motion Inc. Blackberry push service, \n \n http:\/\/us.blackberry.com\/developers\/platform\/pushapi.jsp\n \n \n (retrieved: January 2013)"},{"key":"15_CR20","unstructured":"Nokia Inc. Notifications api, \n \n https:\/\/projects.developer.nokia.com\/notificationsapi\/wiki\n \n \n (retrieved: January 2013)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, S., Lee, P., Lui, J., Guan, X., Ma, X., Tao, J.: Cloud-Based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service. In: ACSAC 2012, Orlando, Florida, USA, December 3-7 (2012)","DOI":"10.1145\/2420950.2420968"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Namiot, D.: Context-Aware Browsing \u2013 A Practical Approach. In: 2012 6th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST), pp. 18\u201323 (2012), doi:10.1109\/NGMAST.2012.13","DOI":"10.1109\/NGMAST.2012.13"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38401-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:12:47Z","timestamp":1557749567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38401-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642384004","9783642384011"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38401-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}