{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:32:32Z","timestamp":1729629152208,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/sam.2012.6250457","type":"proceedings-article","created":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T16:49:46Z","timestamp":1343839786000},"page":"169-172","source":"Crossref","is-referenced-by-count":0,"title":["Thwarting traffic analysis: A signal processing perspective"],"prefix":"10.1109","author":[{"given":"Abhishek","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Parv","family":"Venkitasubramaniam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Memory Limited Anonymous Communications for Data Networks","author":"venkitasubramaniam","year":"2012","journal-title":"IEEE Trans Communications"},{"key":"11","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","article-title":"Stop-and-go MIXes providing probabilistic security in an open system","volume":"1525","author":"kesdogan","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"12","article-title":"Anonymity of Mix Networks under Light Traffic Conditions","author":"venkitasubramaniam","year":"0","journal-title":"Proceedings of the 36th Allerton Conf on Communications Control and Computing (Monticello IL) October 2008"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"journal-title":"The SIGINT Secrets The Signal Intelligence War 1900 to Today","year":"1988","author":"west","key":"2"},{"key":"1","article-title":"Traffic analysis attacks and tradeoffs in anonymity providing systems","author":"back","year":"0","journal-title":"Proceedings of 4th International Information Hiding Workshop (Pittsburg PA) April 2001"},{"key":"10","article-title":"Towards measuring anonymity","volume":"2482","author":"di?az","year":"2002","journal-title":"LNCS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"6","article-title":"Timing Analysis of Keystrokes and Timing Attacks on SSH","author":"song","year":"0","journal-title":"Proc 10th USENIX Security Symposium 2001"},{"key":"5","article-title":"Practical traffic analysis: Extending and resisting statistical disclosure","author":"matthewson","year":"0","journal-title":"Privacy Enhancing Technologies 4th International Workshop May 2004"},{"key":"4","first-page":"19","article-title":"Statistical identification of encrypted web browsing traffic","author":"sun","year":"2002","journal-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy (Berkeley California)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232420"},{"key":"8","article-title":"Mix-networks with restricted routes","volume":"2760","author":"danezis","year":"2003","journal-title":"LNCS"}],"event":{"name":"2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM)","start":{"date-parts":[[2012,6,17]]},"location":"Hoboken, NJ, USA","end":{"date-parts":[[2012,6,20]]}},"container-title":["2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6244722\/6250436\/06250457.pdf?arnumber=6250457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:19:40Z","timestamp":1497982780000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6250457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/sam.2012.6250457","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}