{"id":"https://openalex.org/W2296312799","doi":"https://doi.org/10.1145/2818000.2818046","title":"MobiPluto","display_name":"MobiPluto","publication_year":2015,"publication_date":"2015-12-07","ids":{"openalex":"https://openalex.org/W2296312799","doi":"https://doi.org/10.1145/2818000.2818046","mag":"2296312799"},"language":"en","primary_location":{"id":"doi:10.1145/2818000.2818046","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2818000.2818046","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112868618","display_name":"Bing Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bing Chang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China and University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210165038","https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411913","display_name":"Zhan Wang","orcid":"https://orcid.org/0000-0002-1372-8370"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhan Wang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China and Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100427291","display_name":"Bo Chen","orcid":"https://orcid.org/0000-0001-9372-9607"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Chen","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101886601","display_name":"Fengwei Zhang","orcid":"https://orcid.org/0000-0003-3365-2526"},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fengwei Zhang","raw_affiliation_strings":["Department of Computer Science, Wayne State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wayne State University, USA","institution_ids":["https://openalex.org/I185443292"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112868618"],"corresponding_institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":5.6088,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.96122333,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"390"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8197699189186096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.709351122379303},{"id":"https://openalex.org/keywords/injustice","display_name":"Injustice","score":0.656264066696167},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6379352807998657},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5856108665466309},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5691888332366943},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5115836262702942},{"id":"https://openalex.org/keywords/oppression","display_name":"Oppression","score":0.4556856155395508},{"id":"https://openalex.org/keywords/expose","display_name":"EXPOSE","score":0.4400922954082489},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.42384645342826843},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.35749876499176025},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3312150239944458},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.18737012147903442},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1838778257369995}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8197699189186096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.709351122379303},{"id":"https://openalex.org/C2777266375","wikidata":"https://www.wikidata.org/wiki/Q770480","display_name":"Injustice","level":2,"score":0.656264066696167},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6379352807998657},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5856108665466309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5691888332366943},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5115836262702942},{"id":"https://openalex.org/C2776526686","wikidata":"https://www.wikidata.org/wiki/Q252000","display_name":"Oppression","level":3,"score":0.4556856155395508},{"id":"https://openalex.org/C2779137570","wikidata":"https://www.wikidata.org/wiki/Q16243196","display_name":"EXPOSE","level":2,"score":0.4400922954082489},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.42384645342826843},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.35749876499176025},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3312150239944458},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.18737012147903442},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1838778257369995},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2818000.2818046","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2818000.2818046","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W142764049","https://openalex.org/W1546885574","https://openalex.org/W1574063504","https://openalex.org/W1746848557","https://openalex.org/W1865099434","https://openalex.org/W1988245294","https://openalex.org/W2083919270","https://openalex.org/W2110730009","https://openalex.org/W2122507142","https://openalex.org/W2129492214","https://openalex.org/W2144211824","https://openalex.org/W2166214530","https://openalex.org/W2183140463","https://openalex.org/W2912863417"],"related_works":["https://openalex.org/W2462661851","https://openalex.org/W3124576565","https://openalex.org/W3083663018","https://openalex.org/W2756423716","https://openalex.org/W4387191618","https://openalex.org/W2437686555","https://openalex.org/W2030246973","https://openalex.org/W2419194711","https://openalex.org/W4321636303","https://openalex.org/W4387429380"],"abstract_inverted_index":{"Mobile":[0],"devices":[1],"are":[2],"prevalently":[3],"used":[4],"for":[5],"processing":[6],"personal":[7],"private":[8],"data":[9,32,76],"and":[10],"sometimes":[11],"collecting":[12],"evidence":[13],"of":[14,31,80],"social":[15],"injustice":[16],"or":[17,36],"political":[18],"oppression.":[19],"The":[20],"device":[21,59],"owners":[22,60],"may":[23,49],"always":[24],"feel":[25],"reluctant":[26],"to":[27,33,57,73],"expose":[28],"this":[29,78],"type":[30,79],"undesired":[34],"observers":[35],"inspectors.":[37],"This":[38],"usually":[39],"can":[40],"be":[41],"achieved":[42],"by":[43],"encryption.":[44],"However,":[45],"the":[46],"traditional":[47],"encryption":[48],"not":[50],"work":[51],"when":[52],"an":[53],"adversary":[54],"is":[55,70],"able":[56],"coerce":[58],"into":[61],"revealing":[62],"their":[63],"encrypted":[64],"content.":[65],"Plausibly":[66],"Deniable":[67],"Encryption":[68],"(PDE)":[69],"thus":[71],"designed":[72],"protect":[74],"sensitive":[75],"against":[77],"powerful":[81],"adversaries.":[82]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
