{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:26:36Z","timestamp":1775665596200,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada (NSERC)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"NSERC","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001804","name":"Canada Research Chair","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001804","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2017,3,1]]},"DOI":"10.1109\/tdsc.2015.2451614","type":"journal-article","created":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T17:28:57Z","timestamp":1436290137000},"page":"130-144","source":"Crossref","is-referenced-by-count":25,"title":["CPV: Delay-Based Location Verification for the Internet"],"prefix":"10.1109","volume":"14","author":[{"given":"AbdelRahman","family":"Abdou","sequence":"first","affiliation":[]},{"given":"Ashraf","family":"Matrawy","sequence":"additional","affiliation":[]},{"given":"P. C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.33.2.25"},{"key":"ref38","first-page":"45","article-title":"Triangle inequality and routing\n policy violations in the Internet","author":"lumezanu","year":"0","journal-title":"Proceedings of the 10th International Conference on Passive and Active Network Measurement"},{"key":"ref33","first-page":"243","article-title":"Geographic properties of Internet routing","author":"subramanian","year":"0","journal-title":"Proc General Track Annu Conf USENIX Annu Techn Conf"},{"key":"ref32","first-page":"13","article-title":"Modeling the Internet&#x2019;s Large-scale topology","volume":"99","author":"yook","year":"0","journal-title":"Proc Natl Acad Sci United States Am"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2013.21"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032810.00007"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505228"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504760"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6455"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378228"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177090"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886332"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015471"},{"key":"ref2","first-page":"461","article-title":"Geographically restricted streaming content and evasion of\n geolocation: The applicability of the copyright anticircumvention rules","volume":"19","author":"burnett","year":"2013","journal-title":"Mich Telecomm Tech L Rev"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997484"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2269837"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2411591"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4656"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"ref26","first-page":"23","article-title":"Octant: A\n comprehensive framework for the geolocalization of Internet hosts","author":"wong","year":"0","journal-title":"Proc 4th USENIX Conf Netw Syst Des Implementation"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298331"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869797"},{"key":"ref51","first-page":"93","article-title":"Achieving efficient query privacy\n for location based services","author":"olumofin","year":"0","journal-title":"Proc 10th Int Symp Privacy Enhancing Technol"},{"key":"ref10","first-page":"13","article-title":"Peering through the shroud: The effect of edge opacity on IP-based client identification","author":"casado","year":"0","journal-title":"Proc 4th USENIX Conf Netw Syst Des Implementation"},{"key":"ref40","author":"crovella","year":"2006","journal-title":"Internet Measurement Infrastructure Traffic and Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935165"},{"key":"ref13","first-page":"89","article-title":"GeoWeight: Internet host geolocation based on a probability model for latency measurements","author":"arif","year":"0","journal-title":"Proc 33rd Aus Conf Comput Sci"},{"key":"ref14","first-page":"16","article-title":"Dude, where&#x2019;s that IP? Circumventing\n measurement-based IP geolocation","author":"gill","year":"0","journal-title":"Proc 19th USENIX Conf Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941313"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.08.011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.08.013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614151"},{"key":"ref4","first-page":"567","article-title":"The future of cybertravel: Legal implications of the evasion of\n geolocation","volume":"22","author":"trimble","year":"2011","journal-title":"Fordham Intellectual Property Media and Entertainment Journal"},{"key":"ref3","first-page":"19","article-title":"The man who was there:\n Validating check-ins in location-based services","author":"polakis","year":"0","journal-title":"Proc Comput Security Appl Conf"},{"key":"ref6","author":"popescu","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592455"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9671.2009.01152.x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934991"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77092-3_27"},{"key":"ref9","year":"0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30223-7_52"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5905"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_30"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2349973"},{"key":"ref42","first-page":"1028","article-title":"A novel method for estimating the variable and constant components of one-way\n delays without using the synchronized clocks","author":"liu","year":"0","journal-title":"Proc Int Conf Comput Netw Commun"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2008.926052"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2012.2190551"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874414"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/07145434.pdf?arnumber=7145434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:45:43Z","timestamp":1641987943000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7145434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,1]]},"references-count":51,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2451614","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2017,3,1]]}}}