{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:23:59Z","timestamp":1761895439094},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127512","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:34:31Z","timestamp":1330601671000},"page":"1460-1465","source":"Crossref","is-referenced-by-count":2,"title":["Using a novel blending method over multiple network connections for secure communication"],"prefix":"10.1109","author":[{"given":"Jaime C.","family":"Acosta","sequence":"first","affiliation":[]},{"given":"John D.","family":"Medrano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Achieving rapport with turn-by-turn, userresponsive emotional coloring","author":"acosta","year":"2010","journal-title":"Speech Communication"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2009.5118414"},{"key":"14","article-title":"Mathematical statistics and data analysis","author":"rice","year":"2006","journal-title":"Thomson Learning"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2008.26"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.174"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73137-7_24"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288874"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"10","first-page":"241","article-title":"Polymorphic blending attacks","author":"fogla","year":"0","journal-title":"Proceedings of USENIX Security Symposium 2006"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.306"},{"key":"6","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11767831_10","article-title":"Covert channels in IPv6","author":"lucena","year":"2006","journal-title":"Privacy Enhancing Technologies"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198769"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9245-y"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.248"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127512.pdf?arnumber=6127512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:03:56Z","timestamp":1497956636000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127512","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}