{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:04:53Z","timestamp":1729677893873,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6824986","type":"proceedings-article","created":{"date-parts":[[2014,6,16]],"date-time":"2014-06-16T21:53:24Z","timestamp":1402955604000},"page":"200-206","source":"Crossref","is-referenced-by-count":0,"title":["Conditional disclosure of encrypted whitelists for DDoS attack mitigation"],"prefix":"10.1109","author":[{"given":"Giuseppe","family":"Bianchi","sequence":"first","affiliation":[]},{"given":"Hanieh","family":"Rajabi","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Caponi","sequence":"additional","affiliation":[]},{"given":"Giulio","family":"Picierro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Flow Whitelisting in Scada Networks","year":"2013","author":"barbosa","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-009-0116-9"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5496886"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320197"},{"key":"18","first-page":"22","article-title":"Towards realization of large-scale botnet probing events","author":"vinu","year":"2011","journal-title":"Bonfring International Journal of Research in Communication Engineering"},{"key":"33","first-page":"25","article-title":"Collaborative internet worm containment","author":"cai","year":"2005","journal-title":"IEEE Security &Privacy"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"journal-title":"DShield Distributed Intrusion Detection System","year":"0","key":"34"},{"key":"16","first-page":"1302","article-title":"Ddos mitigation techniques-A survey","author":"garg","year":"2011","journal-title":"International Conference on Advanced Computing Communication and Networks"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.48"},{"key":"13","first-page":"1","article-title":"Enabling conditional crossdomain data sharing via a cryptographic approach","author":"bianchi","year":"2011","journal-title":"5th IEEE IMSAA"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"key":"37","first-page":"363","article-title":"Legislation-aware privacy protection in passive network monitoring","author":"lioudakis","year":"2010","journal-title":"IGI Global-ICT Law Protection and Access Rights Global Approaches and Issues"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672310"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_4"},{"key":"12","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","author":"ohm","year":"2010","journal-title":"UCLA Law Review"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1456441.1456446"},{"key":"22","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-642-20901-7_2","article-title":"Secret-sharing schemes: A survey","author":"beimel","year":"2011","journal-title":"Coding and Cryptology"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_47"},{"key":"24","first-page":"213","article-title":"Identity-based encryption from the weil pairing","volume":"2001","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"25","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"2011","journal-title":"Advances in Cryptology-Eurocrypt"},{"key":"26","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-642-15317-4_27","article-title":"Distributed private-key generators for identity-based cryptography","author":"kate","year":"2010","journal-title":"Security and Cryptography for Networks"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2043165.2043167"},{"journal-title":"CAIDA","year":"0","key":"29"},{"key":"3","first-page":"10","article-title":"Privacy-preserving alert correlation: A concept hierarchy based approach","author":"xu","year":"2005","journal-title":"Computer Security Applications Conference 21st Annual"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/885651.781045"},{"key":"10","article-title":"On the anonymization and deanonymization of netflow traffic","author":"foukarakis","year":"2008","journal-title":"Proc 4th FloCon"},{"key":"1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","article-title":"Probabilistic alert correlation","author":"valdes","year":"2001","journal-title":"Recent Advances in Intrusion Detection"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2006.27"},{"key":"7","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/1278940.1278949","article-title":"Large-scale collection and sanitization of network security data: Risks and challenges","author":"porras","year":"2006","journal-title":"Proc 2006 Workshop on New Security Paradigms"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SECCMW.2005.1588299"},{"key":"32","article-title":"Global intrusion detection in the domino overlay system","author":"yegneswaran","year":"2004","journal-title":"NDSS"},{"key":"5","first-page":"248","article-title":"Smurfen: A system framework for rule sharing collaborative intrusion detection","author":"fung","year":"2011","journal-title":"7th Int Conf on Network and Services Management"},{"key":"31","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-540-87353-2_9","article-title":"Trust management for host-based collaborative intrusion detection","author":"fung","year":"2008","journal-title":"Managing Large-Scale Service Deployment"},{"key":"4","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","article-title":"Aggregation and correlation of intrusiondetection alerts","author":"debar","year":"2001","journal-title":"Recent Advances in Intrusion Detection"},{"key":"9","first-page":"31","article-title":"On the protection of individuals with regard to the processing of personal data and on the free movement of such data","volume":"281","year":"0","journal-title":"OJL"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1866870.1866879"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06824986.pdf?arnumber=6824986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T05:18:36Z","timestamp":1689311916000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6824986","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}