{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:39:02Z","timestamp":1729669142983,"version":"3.28.0"},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/wowmom.2008.4594885","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T19:35:49Z","timestamp":1218656149000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Demonstration of unobservable voice over IP"],"prefix":"10.1109","author":[{"given":"Miroslav","family":"Knezevic","sequence":"first","affiliation":[]},{"given":"Vesselin","family":"Velichkov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"dummy traffic against long term intersection attacks","volume":"2482","author":"berthold","year":"2002","journal-title":"LNCS"},{"key":"2","first-page":"245","article-title":"traffic analysis attacks and trade-offs in anonymity providing systems","volume":"2137","author":"back","year":"2001","journal-title":"LNCS"},{"key":"1","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-60865-6_48","article-title":"two practical and provably secure block ciphers: bear and lion","author":"anderson","year":"1996","journal-title":"Fast Software Encryption"},{"key":"5","first-page":"10","article-title":"traffic analysis: protocols, attacks, design issues, and open problems","author":"raymond","year":"2000","journal-title":"LNCS"},{"key":"4","article-title":"tor: the second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"}],"event":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM)","start":{"date-parts":[[2008,6,23]]},"location":"Newport Beach, CA, USA","end":{"date-parts":[[2008,6,26]]}},"container-title":["2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586176\/4594794\/04594885.pdf?arnumber=4594885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T09:29:16Z","timestamp":1557739756000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4594885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2008.4594885","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}