Leaky Birds: Exploiting Mobile Application Traffic for Surveillance. Vanrykel, E., Acar, G., Herrmann, M., & Díaz, C. In Grossklags, J. & Preneel, B., editors, Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, volume 9603, of Lecture Notes in Computer Science, pages 367–384, 2016. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/fc/VanrykelAHD16,
author = {Eline Vanrykel and
Gunes Acar and
Michael Herrmann and
Claudia D{\'{\i}}az},
editor = {Jens Grossklags and
Bart Preneel},
title = {Leaky Birds: Exploiting Mobile Application Traffic for Surveillance},
booktitle = {Financial Cryptography and Data Security - 20th International Conference,
{FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {9603},
pages = {367--384},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-54970-4\_22},
doi = {10.1007/978-3-662-54970-4\_22},
timestamp = {Tue, 14 May 2019 10:00:38 +0200},
biburl = {https://dblp.org/rec/conf/fc/VanrykelAHD16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"KmqTvsGMdxFx6PJqx","bibbaseid":"vanrykel-acar-herrmann-daz-leakybirdsexploitingmobileapplicationtrafficforsurveillance-2016","author_short":["Vanrykel, E.","Acar, G.","Herrmann, M.","Díaz, C."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Eline"],"propositions":[],"lastnames":["Vanrykel"],"suffixes":[]},{"firstnames":["Gunes"],"propositions":[],"lastnames":["Acar"],"suffixes":[]},{"firstnames":["Michael"],"propositions":[],"lastnames":["Herrmann"],"suffixes":[]},{"firstnames":["Claudia"],"propositions":[],"lastnames":["Díaz"],"suffixes":[]}],"editor":[{"firstnames":["Jens"],"propositions":[],"lastnames":["Grossklags"],"suffixes":[]},{"firstnames":["Bart"],"propositions":[],"lastnames":["Preneel"],"suffixes":[]}],"title":"Leaky Birds: Exploiting Mobile Application Traffic for Surveillance","booktitle":"Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers","series":"Lecture Notes in Computer Science","volume":"9603","pages":"367–384","publisher":"Springer","year":"2016","url":"https://doi.org/10.1007/978-3-662-54970-4_22","doi":"10.1007/978-3-662-54970-4_22","timestamp":"Tue, 14 May 2019 10:00:38 +0200","biburl":"https://dblp.org/rec/conf/fc/VanrykelAHD16.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/fc/VanrykelAHD16,\n author = {Eline Vanrykel and\n Gunes Acar and\n Michael Herrmann and\n Claudia D{\\'{\\i}}az},\n editor = {Jens Grossklags and\n Bart Preneel},\n title = {Leaky Birds: Exploiting Mobile Application Traffic for Surveillance},\n booktitle = {Financial Cryptography and Data Security - 20th International Conference,\n {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised\n Selected Papers},\n series = {Lecture Notes in Computer Science},\n volume = {9603},\n pages = {367--384},\n publisher = {Springer},\n year = {2016},\n url = {https://doi.org/10.1007/978-3-662-54970-4\\_22},\n doi = {10.1007/978-3-662-54970-4\\_22},\n timestamp = {Tue, 14 May 2019 10:00:38 +0200},\n biburl = {https://dblp.org/rec/conf/fc/VanrykelAHD16.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Vanrykel, E.","Acar, G.","Herrmann, M.","Díaz, C."],"editor_short":["Grossklags, J.","Preneel, B."],"key":"DBLP:conf/fc/VanrykelAHD16","id":"DBLP:conf/fc/VanrykelAHD16","bibbaseid":"vanrykel-acar-herrmann-daz-leakybirdsexploitingmobileapplicationtrafficforsurveillance-2016","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-662-54970-4_22"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/136/8452.bib","dataSources":["rC95RYNhDBAF7ynCS"],"keywords":[],"search_terms":["leaky","birds","exploiting","mobile","application","traffic","surveillance","vanrykel","acar","herrmann","díaz"],"title":"Leaky Birds: Exploiting Mobile Application Traffic for Surveillance","year":2016}