{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:42Z","timestamp":1761401802665,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319281650"},{"type":"electronic","value":"9783319281667"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28166-7_12","type":"book-chapter","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T15:29:04Z","timestamp":1452266944000},"page":"243-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Compagno","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Gasti","sequence":"additional","affiliation":[]},{"given":"Luigi Vincenzo","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,9]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Acs, G., Conti, M., Gasti, P., Ghali, C., Tsudik, G.: Cache privacy in named-data networking. In: ICDCS, pp. 41\u201351. IEEE Computer Society (2013)","DOI":"10.1109\/ICDCS.2013.12"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Conti, M., Gasti, P., Tsudik, G.: Covert ephemeral communication in named data networking. In: AsiaCCS, pp. 15\u201326. ACM (2014)","DOI":"10.1145\/2590296.2590306"},{"key":"12_CR3","unstructured":"American Registry for Internet Numbers (ARIN). https:\/\/www.arin.net\/"},{"key":"12_CR4","unstructured":"CCNx protocol. http:\/\/www.ccnx.org\/releases\/latest\/doc\/technical\/CCNxProtocol.html"},{"key":"12_CR5","unstructured":"ChoiceNet. https:\/\/code.renci.org\/gf\/project\/choicenet\/"},{"key":"12_CR6","unstructured":"DiBenedetto, S., Gasti, P., Tsudik, G., Uzun, E.: Andana: anonymous named data networking application. In: NDSS. IEEE Computer Society (2012)"},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/COMST.2007.4444750","volume":"9","author":"B Donnet","year":"2007","unstructured":"Donnet, B., Friedman, T.: Internet topology discovery: a survey. Commun. Surv. Tutorials 9(4), 56\u201369 (2007)","journal-title":"Commun. Surv. Tutorials"},{"key":"12_CR8","unstructured":"Amazon Elastic Computing Cloud (EC2). http:\/\/aws.amazon.com\/ec2"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-12334-4_18","volume-title":"Passive and Active Measurement","author":"B Eriksson","year":"2010","unstructured":"Eriksson, B., Barford, P., Sommers, J., Nowak, R.: A learning-based approach for IP geolocation. In: Krishnamurthy, A., Plattner, B. (eds.) PAM 2010. LNCS, vol. 6032, pp. 171\u2013180. Springer, Heidelberg (2010)"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1002\/cpa.3160020103","volume":"2","author":"B Friedman","year":"1949","unstructured":"Friedman, B.: A simple urn model. Commun. Pure Appl. Math. 2(1), 59\u201370 (1949)","journal-title":"Commun. Pure Appl. Math."},{"key":"12_CR11","unstructured":"MaxMind GeoIP database. https:\/\/www.maxmind.com\/"},{"key":"12_CR12","unstructured":"GeoTrace. http:\/\/www.nabber.org\/projects\/geotrace\/"},{"issue":"6","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1109\/TNET.2006.886332","volume":"14","author":"B Gueye","year":"2006","unstructured":"Gueye, B., Ziviani, A., Crovella, M., Fdida, S.: Constraint-based geolocation of internet hosts. Trans. Network. 14(6), 1219\u20131232 (2006)","journal-title":"Trans. Network."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., Briggs, N.H., Plass, M.F., Thornton, P.S.J.D., Braynard, R.L.: Voccn: voice-over content centric networks. In: ReArch. ACM (2009)","DOI":"10.1145\/1658978.1658980"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: CoNEXT, pp. 1\u201312. ACM (2009)","DOI":"10.1145\/1658939.1658941"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Katz-Bassett, E., John, J.P., Krishnamurthy, A., Wetherall, D., Anderson, T., Chawathe, Y.: Towards IP geolocation using delay and topology measurements. In: SIGCOMM IMC, pp. 71\u201384. ACM (2006)","DOI":"10.1145\/1177080.1177090"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Liu, H., Zhang, Y., Zhou, Y., Zhang, D., Fu, X., Ramakrishnan, K.: Mining checkins from location-sharing services for client-independent ip geolocation. In: INFOCOM, pp. 619\u2013627. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847987"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-00975-4_5","volume-title":"Passive and Active Network Measurement","author":"C Lumezanu","year":"2009","unstructured":"Lumezanu, C., Baden, R., Spring, N., Bhattacharjee, B.: Triangle inequality and routing policy violations in the internet. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 45\u201354. Springer, Heidelberg (2009)"},{"key":"12_CR19","unstructured":"MobilityFirst FIA Overview. http:\/\/mobilityfirst.winlab.rutgers.edu"},{"key":"12_CR20","unstructured":"Named data networking project (NDN). http:\/\/named-data.org"},{"key":"12_CR21","unstructured":"NDN testbed. http:\/\/named-data.net\/ndn-testbed\/"},{"key":"12_CR22","unstructured":"Nebula. http:\/\/nebula.cis.upenn.edu"},{"issue":"4","key":"12_CR23","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1145\/964723.383073","volume":"31","author":"VN Padmanabhan","year":"2001","unstructured":"Padmanabhan, V.N., Subramanian, L.: An investigation of geographic mapping techniques for internet hosts. SIGCOMM Comput. Comm. Rev. 31(4), 173\u2013185 (2001)","journal-title":"SIGCOMM Comput. Comm. Rev."},{"key":"12_CR24","unstructured":"Periakaruppan, R., Nemeth, E.: Gtrace - a graphical traceroute tool. In: USENIX LISA, pp. 69\u201378. ACM (1999)"},{"key":"12_CR25","unstructured":"R\u00e9seaux IP Europ\u00e9ens (RIPE). http:\/\/www.ripe.net\/"},{"key":"12_CR26","unstructured":"Rocketfuel. http:\/\/research.cs.washington.edu\/networking\/rocketfuel\/"},{"issue":"5","key":"12_CR27","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"12_CR28","unstructured":"Tor Project: Anonymity Online. https:\/\/www.torproject.org"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Verde, N.V., Ateniese, G., Gabrielli, E., Mancini, L.V., Spognardi, A.: No nat\u2019d user left behind: Fingerprinting users behind NAT from netflow records alone. In: ICDCS, pp. 218\u2013227. IEEE Computer Society (2014)","DOI":"10.1109\/ICDCS.2014.30"},{"key":"12_CR30","unstructured":"Wang, Y., Burgener, D., Flores, M., Kuzmanovic, A., Huang, C.: Towards street-level client-independent ip geolocation. In: USENIX NSDI, pp. 365\u2013379. USENIX Association (2011)"},{"key":"12_CR31","unstructured":"Wong, B., Stoyanov, I., Sirer, E.G.: Octant: A comprehensive framework for the geolocalization of internet hosts. In: USENIX NSDI, pp. 313\u2013326. USENIX Association (2007)"},{"key":"12_CR32","unstructured":"XIA - eXpressive Internet Architecture. http:\/\/www.cs.cmu.edu\/~xia\/"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Burke, J., Zhang, L., Gasti, P., Lu, Y., Jacobson, V.: A new approach to securing audio conference tools. In: AINTEC, pp. 120\u2013123. ACM (2011)","DOI":"10.1145\/2089016.2089036"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28166-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T01:09:55Z","timestamp":1612314595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28166-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319281650","9783319281667"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28166-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}