{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:04:22Z","timestamp":1726002262940},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_18","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"345-363","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Marsalek","sequence":"first","affiliation":[]},{"given":"Bernd","family":"Pr\u00fcnster","sequence":"additional","affiliation":[]},{"given":"Bojan","family":"Suzic","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Zefferer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"18_CR1","unstructured":"WhatsApp. One Billion, 1 February 2016. https:\/\/blog.whatsapp.com\/616\/One-billion . Accessed 19 Apr 2017"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-17172-2_4","volume-title":"Traffic Monitoring and Analysis","author":"P Fiadino","year":"2015","unstructured":"Fiadino, P., Schiavone, M., Casas, P.: Vivisecting WhatsApp in cellular networks: servers, flows, and quality of experience. In: Steiner, M., Barlet-Ros, P., Bonaventure, O. (eds.) TMA 2015. LNCS, vol. 9053, pp. 49\u201363. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17172-2_4"},{"issue":"5","key":"18_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2677046.2677048","volume":"44","author":"SE Coull","year":"2014","unstructured":"Coull, S.E., Dyer, K.P.: Traffic analysis of encrypted messaging services: Apple imessage and beyond. ACM SIGCOMM Comput. Commun. Rev. 44(5), 5\u201311 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Azfar, A., Choo, K.K.R., Liu, L.: A study of ten popular android mobile voip applications: are the communications encrypted? In: 2014 HICSS-47, pp. 4858-4867 (2014). https:\/\/doi.org\/10.1109\/HICSS.2014.596","DOI":"10.1109\/HICSS.2014.596"},{"key":"18_CR5","unstructured":"cnet.com: Instant messaging latest trend in e-commerce software (2009). https:\/\/www.cnet.com\/news\/instant-messaging-latest-trend-in-e-commerce-software\/"},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MC.2003.1185208","volume":"36","author":"G Lawton","year":"2003","unstructured":"Lawton, G.: Instant messaging puts on a business suit. Computer 36(3), 14\u201316 (2003)","journal-title":"Computer"},{"key":"18_CR7","first-page":"17","volume":"11","author":"S Doyle","year":"2003","unstructured":"Doyle, S.: Is instant messaging going to replace SMS and e-mail as the medium of choice for direct customer communications? J. Datab. Mark. Customer Strategy Manag. 11, 17\u2013182 (2003)","journal-title":"J. Datab. Mark. Customer Strategy Manag."},{"issue":"1","key":"18_CR8","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.chb.2003.12.001","volume":"21","author":"AF Cameron","year":"2005","unstructured":"Cameron, A.F., Webster, J.: Unintended consequences of emerging communication technologies: instant messaging in the workplace. Comput. Hum. Behav. 21(1), 85\u2013103 (2005). ISSN 0747\u20135632","journal-title":"Comput. Hum. Behav."},{"key":"18_CR9","unstructured":"Gann, R.: Instant messaging for business (2012). https:\/\/www.techradar.com\/news\/world-of-tech\/roundup\/instant-messaging-for-business-1075434"},{"key":"18_CR10","unstructured":"Schneier, B.: NSA doesn\u2019t need to spy on your calls to learn your secrets. Wired (2015)"},{"issue":"20","key":"18_CR11","doi-asserted-by":"publisher","first-page":"5536","DOI":"10.1073\/pnas.1508081113","volume":"113","author":"J Mayer","year":"2016","unstructured":"Mayer, J., Mutchler, P., Mitchell, J.C.: Evaluating the privacy properties of telephone metadata. Proc. Nat. Acad. Sci. 113(20), 5536\u20135541 (2016). https:\/\/doi.org\/10.1073\/pnas.1508081113","journal-title":"Proc. Nat. Acad. Sci."},{"issue":"2","key":"18_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2014.28","volume":"12","author":"B Schneier","year":"2014","unstructured":"Schneier, B.: Metadata = surveillance. IEEE Secur. Priv. 12(2), 84\u201384 (2014). https:\/\/doi.org\/10.1109\/MSP.2014.28 . ISSN 1540-7993","journal-title":"IEEE Secur. Priv."},{"key":"18_CR13","first-page":"2014","volume":"10","author":"D Cole","year":"2014","unstructured":"Cole, D.: We kill people based on metadata. N. Y. Rev. Books 10, 2014 (2014)","journal-title":"N. Y. Rev. Books"},{"key":"18_CR14","unstructured":"Goldberg, I., OTR Development Team: Off-the record messaging protocol version 3, 6 January 2016. https:\/\/otr.cypherpunks.ca\/Protocol-v3-4.0.0.html . Accessed 16 Mar 2017"},{"key":"18_CR15","unstructured":"Crypviser GmbH: Crypviser - the most secure solution ever (whitepaper), May 2017. https:\/\/ico.crypviser.net\/static\/docs\/CrypViserWhitepaper_en.pdf . Accessed 05 Sept 2017"},{"key":"18_CR16","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). eprint: https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, August 2004","DOI":"10.21236\/ADA465464"},{"key":"18_CR18","unstructured":"Buterin, V., et al.: Ethereum white paper (2013). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"18_CR19","unstructured":"Szil\u00e1yi, P.: Clique PoA protocol & Rinkeby PoA testnet #225 (2017). https:\/\/github.com\/ethereum\/EIPs\/issues\/225"},{"issue":"5","key":"18_CR20","first-page":"13","volume":"6","author":"G Greenwald","year":"2013","unstructured":"Greenwald, G.: NSA collecting phone records of millions of Verizon customers daily. The Guardian 6(5), 13 (2013)","journal-title":"The Guardian"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Lyon, J., Wong, M.: Sender id: Authenticating e-mail. RFC Editor, RFC 4406, April 2006","DOI":"10.17487\/rfc4406"},{"key":"18_CR22","unstructured":"Carnegie Mellon University: CERT Division: Spoofed\/forged email, September 2017. http:\/\/cert.org\/historical\/tech_tips\/email_spoofing.cfm . Accessed 05 Sept 2017"},{"key":"18_CR23","unstructured":"Brown, D.R.L.: Standards for Efficient Cryptography 2 (SEC 2), January 2010. http:\/\/www.secg.org\/sec2-v2.pdf . Accessed 27 July 2018"},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-658-16839-1_8","volume-title":"Datenschutz","author":"R Petrlic","year":"2017","unstructured":"Petrlic, R., Sorge, C.: Instant messaging. Datenschutz, pp. 97\u2013108. Springer, Wiesbaden (2017). https:\/\/doi.org\/10.1007\/978-3-658-16839-1_8"},{"key":"18_CR25","unstructured":"Schrittwieser, S., et al.: Guess who\u2019s texting you. Evaluating the Security of Smartphone Messaging Applications, SBA Research gGmbH (2012)"},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: 2017 IEEE EuroS&P, April 2017, pp. 451\u2013466. https:\/\/doi.org\/10.1109\/EuroSP.2017.27","DOI":"10.1109\/EuroSP.2017.27"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:26:39Z","timestamp":1573053999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}