{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:26:48Z","timestamp":1752460008594,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infcom.2012.6195626","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T22:26:40Z","timestamp":1337898400000},"page":"2372-2380","source":"Crossref","is-referenced-by-count":17,"title":["Obfuscation of sensitive data in network flows"],"prefix":"10.1109","author":[{"given":"Daniele","family":"Riboni","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Villani","sequence":"additional","affiliation":[]},{"given":"Domenico","family":"Vitali","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.307"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223258"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.27"},{"key":"3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/11767831_12","article-title":"Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies","volume":"3856","author":"brekne","year":"2006","journal-title":"5th Workshop on Privacy Enhancing Technologies"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529572"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"10","article-title":"Playing devil's advocate: Inferring sensitive information from anonymized network traces","author":"coull","year":"2007","journal-title":"Proc of NDSS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672310"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519147"},{"key":"5","first-page":"63","article-title":"FLAIM: A multi-level anonymization framework for computer and network logs","author":"slagell","year":"2006","journal-title":"Proceedings of the USENIX\/SAGE Large Installation System Administration conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"9","first-page":"43","article-title":"Circumventing ip-address pseudonymization","author":"brekne","year":"2005","journal-title":"Proc of International Conference on Computer Communications and Networks"},{"key":"8","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/978-3-642-02918-9_10","article-title":"Browser fingerprinting from coarse traffic summaries: Techniques and implications","volume":"5587","author":"yen","year":"2009","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"}],"event":{"name":"IEEE INFOCOM 2012 - IEEE Conference on Computer Communications","start":{"date-parts":[[2012,3,25]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6189419\/6195452\/06195626.pdf?arnumber=6195626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:14:21Z","timestamp":1497986061000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6195626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/infcom.2012.6195626","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}