{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:30:06Z","timestamp":1730280606332,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcn.2015.7366356","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T17:15:34Z","timestamp":1452186934000},"page":"474-477","source":"Crossref","is-referenced-by-count":0,"title":["Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication"],"prefix":"10.1109","author":[{"given":"Ana","family":"Barroso","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The mobile data challenge: Big data for mobile computing research","author":"laurila","year":"2012","journal-title":"Pervasive Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-40026-5_17"},{"key":"ref12","article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unob-servability, pseudonymity, and identity management","volume":"10","author":"pfitzmann","year":"2010","journal-title":"Version 0 34"},{"key":"ref13","article-title":"Safe and private data sharing with Turtle: friends team-up and beat the system","author":"popescu","year":"2004","journal-title":"Security Protocols"},{"key":"ref14","first-page":"14","article-title":"How to disappear completely: A survey of private peer-to-peer networks","volume":"13","author":"rogers","year":"2007","journal-title":"Networks"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491319"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795283619"},{"article-title":"aDTN - undetectable communication in wireless delay-tolerant networks","year":"2014","author":"barroso","key":"ref3"},{"key":"ref6","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"DTIC Document Tech Rep"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230180406"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592456"},{"key":"ref2","first-page":"181","article-title":"Privacy-aware message exchanges for geographically routed human movement networks","volume":"7459","author":"aviv","year":"2012","journal-title":"Computer Security ESORICS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2005.01.002"}],"event":{"name":"2015 IEEE 40th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360816\/7366232\/07366356.pdf?arnumber=7366356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:22:02Z","timestamp":1490401322000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/lcn.2015.7366356","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}