{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:24:58Z","timestamp":1747459498451},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/icnp.2016.7784450","type":"proceedings-article","created":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T07:55:26Z","timestamp":1481961326000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Communication based on per-packet One-Time Addresses"],"prefix":"10.1109","author":[{"family":"Taeho Lee","sequence":"first","affiliation":[]},{"given":"Christos","family":"Pappas","sequence":"additional","affiliation":[]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_6"},{"key":"ref11","article-title":"RAPTOR: Routing Attacks on Privacy in Tor","author":"sun","year":"2015","journal-title":"Proc Usenix Security Symposium"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015487"},{"journal-title":"Resource Public Key Infrastructure","year":"0","key":"ref14"},{"key":"ref15","article-title":"Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm","author":"bellare","year":"2000","journal-title":"Adv Cryptology"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4106"},{"journal-title":"High-speed High-security Signatures","year":"2012","author":"bernstein","key":"ref17"},{"journal-title":"eBACS ECRYPT Benchmarking of Cryptographic Systems","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4543"},{"journal-title":"Secrets in Your Pocket","year":"0","author":"wuergler","key":"ref4"},{"journal-title":"Stalker A Creepy Look at You Online","year":"0","author":"fink","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626306"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102133"},{"key":"ref7","article-title":"On Flow Correlation Attacks and Countermeasures in Mix Networks","author":"zhu","year":"2004","journal-title":"P of PETS Workshop"},{"journal-title":"The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)","year":"0","author":"bamford","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_2"},{"journal-title":"What Everybody Ought to Know About HideMyAss","year":"0","author":"andre","key":"ref1"},{"key":"ref20","article-title":"Curve25519: New Diffie-Hellman Speed Records","author":"bernstein","year":"2006","journal-title":"Public Key Cryptography (PKC)"},{"journal-title":"The CAIDA UCSD Anonymized Internet Traces","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660146"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486032"},{"key":"ref23","article-title":"An Internet Architecture Based on the Principle of Least Privilege","author":"liu","year":"2012","journal-title":"Tech Rep UW-CSE-12-09-04"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516737"},{"key":"ref25","article-title":"The Case for Ubiquitous Transport-level Encryption","author":"bittau","year":"2010","journal-title":"Proc Usenix Security Symposium"}],"event":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2016,11,8]]},"location":"Singapore","end":{"date-parts":[[2016,11,11]]}},"container-title":["2016 IEEE 24th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7774710\/7784399\/07784450.pdf?arnumber=7784450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T02:07:52Z","timestamp":1506996472000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7784450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icnp.2016.7784450","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}