{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:06:14Z","timestamp":1725750374661},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/camad.2017.8031529","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T20:49:34Z","timestamp":1505422174000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["From Dining Cryptographers to dining things: Unobservable communication in the IoT"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Bauer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralf C.","family":"Staudemeyer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_22"},{"key":"ref11","article-title":"Herbivore: A scalable and efficient protocol for anonymous communication","author":"goel","year":"2003","journal-title":"Cornell University Computing and Information Science Technical Report"},{"journal-title":"CC2538 a powerful System-On-Chip for 2 4-GHz IEEE 802 15 4 and ZigBee applications","year":"2016","author":"instruments","key":"ref12"},{"journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks","year":"2007","author":"montenegro","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523559"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"ref17","article-title":"6LoWPAN demystified","author":"olsson","year":"2014","journal-title":"Technical Report"},{"key":"ref18","article-title":"A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","author":"pfitzmann","year":"2010","journal-title":"Tech Rep Nov"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2014.6934872"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref5","first-page":"147","article-title":"Proactively accountable anonymous messaging in verdict","author":"corrigan-gibbs","year":"2013","journal-title":"Presented as part of the 22nd USENIX Security Symp (USENIX Security 13) SEC'13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"ref7","first-page":"2","article-title":"RIME - a lightweight layered communication stack for sensor networks","author":"dunkels","year":"2007","journal-title":"European conference on Wireless Sensor Networks (EWSN)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"journal-title":"Architectural Styles and the Design of Network-Based Software Architectures","year":"2000","author":"fielding","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_1"},{"journal-title":"Datagram Transport Layer Security Version 1 2 IETF RFC 6347","year":"2012","author":"rescorla","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133611"},{"journal-title":"Constrained Application Protocol (CoAP)","year":"2014","author":"shelby","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_69"},{"key":"ref23","first-page":"302","article-title":"Unconditional sender and recipient untraceability in spite of active attacks","author":"waidner","year":"1989","journal-title":"Proceedings of Advances in Cryptology (EURO-CRYPT)"},{"journal-title":"Zolertia - Re-Mote","year":"2015","key":"ref26"},{"key":"ref25","first-page":"179","article-title":"Dissent in numbers: Making strong anonymity scale","author":"wolinsky","year":"2012","journal-title":"Proc of the 10th USENIX Conf on Operating Systems Design and Implementation OSDI&#x2019; 12"}],"event":{"name":"2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","start":{"date-parts":[[2017,6,19]]},"location":"Lund, Sweden","end":{"date-parts":[[2017,6,21]]}},"container-title":["2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8025354\/8031521\/08031529.pdf?arnumber=8031529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:58:36Z","timestamp":1507003116000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8031529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/camad.2017.8031529","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}