{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:19Z","timestamp":1763507659711,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/icc.2010.5501972","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T10:22:30Z","timestamp":1278930150000},"page":"1-5","source":"Crossref","is-referenced-by-count":28,"title":["Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks"],"prefix":"10.1109","author":[{"given":"S.","family":"Kadloor","sequence":"first","affiliation":[]},{"given":"X.","family":"Gong","sequence":"additional","affiliation":[]},{"given":"N.","family":"Kiyavash","sequence":"additional","affiliation":[]},{"given":"T.","family":"Tezcan","sequence":"additional","affiliation":[]},{"given":"N.","family":"Borisov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_1"},{"key":"ref10","article-title":"A practical congestion attack on Tor using long paths","author":"evans","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/SP.2008.21","article-title":"Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations","author":"wright","year":"2008","journal-title":"SP'08 Proceedings of the 2008 IEEE Symposium on Security and Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2008.93"},{"key":"ref5","article-title":"Timing analysis of keystrokes and SSH timing attacks","author":"song","year":"2001","journal-title":"USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/948209.948211"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"ref7","first-page":"76","article-title":"Traffic analysis attacks and tradeoffs in anonymity providing systems","volume":"2137","author":"back","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"The TLS protocol version 1 0 &#x201D; RFC2246","year":"1999","author":"dierks","key":"ref2"},{"key":"ref9","first-page":"303","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"USENIX Security Symposium"},{"year":"0","key":"ref1","article-title":"Wire and electronic communications interception and interception of oral communications"}],"event":{"name":"ICC 2010 - 2010 IEEE International Conference on Communications","start":{"date-parts":[[2010,5,23]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2010,5,27]]}},"container-title":["2010 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5497983\/5501741\/05501972.pdf?arnumber=5501972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T06:43:01Z","timestamp":1497854581000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5501972\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icc.2010.5501972","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}