{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:13:21Z","timestamp":1760044401698},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdcs.2002.1022244","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:04:13Z","timestamp":1056564253000},"page":"74-83","source":"Crossref","is-referenced-by-count":83,"title":["Routing through the mist: privacy preserving communication in ubiquitous computing environments"],"prefix":"10.1109","author":[{"given":"J.","family":"Al-Muhtadi","sequence":"first","affiliation":[]},{"given":"R.","family":"Campbell","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kapadia","sequence":"additional","affiliation":[]},{"given":"M.D.","family":"Mickunas","sequence":"additional","affiliation":[]},{"family":"Seung Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566772"},{"key":"ref12","first-page":"2001","article-title":"GaiaOS: An Infrastructure for Active Spaces","author":"roman","year":"2001","journal-title":"Technical Report UIUCDCS-R-2001-2224 UILU-ENG"},{"key":"ref13","article-title":"Reflective Middleware: From Your Desk to Your Hand","author":"roman","year":"2001","journal-title":"IEEE Distributed Systems Print Journal Special Issue on Reflective Middleware"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"journal-title":"SafeWeb","year":"0","key":"ref15"},{"key":"ref16","article-title":"As Big PC Brprint Watches, Users Encounter Frustration","author":"schwartz","year":"2001","journal-title":"The New York Times"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359665"},{"key":"ref3","article-title":"Core Based Trees (CBT), An Architecture for Scalable Inter-Domain Multicast Routing","author":"ballardie","year":"1993","journal-title":"ACM SIGCOMM"},{"journal-title":"Gaia Homepage","year":"0","key":"ref6"},{"journal-title":"Freedom net","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45427-6_23","article-title":"Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems","author":"langheinrich","year":"2001","journal-title":"Proceedings of the ACM Ubicomp 2001"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/MILCOM.1999.822783","article-title":"Preventing Traffic Analysis for Real-Time Communication Networks","author":"guan","year":"1999","journal-title":"Proc IEEE Military Communications Conf (MILCOM)"},{"key":"ref2","article-title":"Routing through the Mist: Design and Implementation","author":"al-muhtadi","year":"2002","journal-title":"Tech Rep UIUCDCS-R-2002-2267"},{"journal-title":"Anonymizer","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"}],"event":{"name":"22nd International Conference on Distributed Computing Systems","acronym":"ICDCSW-02","location":"Vienna, Austria"},"container-title":["Proceedings 22nd International Conference on Distributed Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7958\/21986\/01022244.pdf?arnumber=1022244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:42:48Z","timestamp":1497552168000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1022244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icdcs.2002.1022244","relation":{},"subject":[]}}