{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:44:51Z","timestamp":1725799491153},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/icnp.2011.6089048","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T16:01:09Z","timestamp":1323187269000},"page":"165-175","source":"Crossref","is-referenced-by-count":21,"title":["EphPub: Toward robust Ephemeral Publishing"],"prefix":"10.1109","author":[{"given":"Claude","family":"Castelluccia","sequence":"first","affiliation":[]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[]},{"given":"Aurelien","family":"Francillon","sequence":"additional","affiliation":[]},{"given":"Mohamed-Ali","family":"Kaafar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"DNS - Open Recursive Name Server Probing","year":"2011","author":"kristoff","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028837"},{"journal-title":"BIND 9 DNS Cache Poisoning","year":"2007","author":"klein","key":"18"},{"journal-title":"Experiences Building Security Applications on DHTs","year":"0","author":"geambasu","key":"15"},{"key":"16","article-title":"Vanish: Increasing data privacy with self-destructing data","author":"geambasu","year":"2009","journal-title":"Usenix Security"},{"journal-title":"Facebook's Privacy Policy","year":"2011","key":"13"},{"key":"14","article-title":"Private Sharing of User Location over Online Social Networks","author":"freudiger","year":"2010","journal-title":"HotPets"},{"key":"11","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"IPTPS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2535"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"journal-title":"Information Theory Inference and Learning Algorithms","year":"2003","author":"mackay","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1035"},{"key":"23","article-title":"A Hybrid PKI-IBC Based Ephemerizer System","author":"nair","year":"2007","journal-title":"ISC"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.5"},{"key":"25","article-title":"The Ephemerizer: Making data disappear","author":"perlman","year":"2005","journal-title":"The Journal of Information System Security (JISSec)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"journal-title":"Encrypted E-Mail Company Hushmail Spills to Feds","year":"2007","author":"singel","key":"27"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-16161-2_22","article-title":"Fade: Secure overlay cloud storage with file assured deletion","author":"tang","year":"2010","journal-title":"Proccdings of Security and Privacy in Communication Networks"},{"journal-title":"DNS survey","year":"2011","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1912"},{"journal-title":"DNS and Bind","year":"2001","author":"albitz","key":"2"},{"key":"10","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Usenix Security"},{"journal-title":"Linux Programmer's Manual","year":"2011","key":"1"},{"journal-title":"Multiple DNS Implementations Vulnerable to Cache Poisoning","year":"2008","key":"30"},{"key":"7","article-title":"Corrupted DNS resolution paths: The rise of a malicious resolution authority","author":"dagon","year":"2008","journal-title":"NDSS"},{"journal-title":"Attack of the Zombie Photo","year":"0","author":"bonneau","key":"6"},{"key":"5","article-title":"Collusion resistant broadcast encryption with short ciphertexts and private keys","author":"boneh","year":"2005","journal-title":"Crypto"},{"key":"31","article-title":"Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs","author":"wolchok","year":"0","journal-title":"NDSS'10"},{"journal-title":"DNS Proxy Implementation Guidelines","year":"2011","author":"bellis","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"journal-title":"Risk Reduction Strategies on Facebook","year":"2010","author":"boyd","key":"8"}],"event":{"name":"2011 19th IEEE International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2011,10,17]]},"location":"Vancouver, AB, Canada","end":{"date-parts":[[2011,10,20]]}},"container-title":["2011 19th IEEE International Conference on Network Protocols"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6085960\/6089029\/06089048.pdf?arnumber=6089048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:53:22Z","timestamp":1497941602000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6089048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icnp.2011.6089048","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}