{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:17:31Z","timestamp":1725758251991},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/wowmom.2009.5282445","type":"proceedings-article","created":{"date-parts":[[2009,10,12]],"date-time":"2009-10-12T15:45:06Z","timestamp":1255362306000},"page":"1-7","source":"Crossref","is-referenced-by-count":15,"title":["Privacy in context-based and epidemic forwarding"],"prefix":"10.1109","author":[{"given":"Abdullatif","family":"Shikfa","sequence":"first","affiliation":[]},{"given":"Melek","family":"Onen","sequence":"additional","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1080139.1080143"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/359340.359342"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/WAINA.2009.73"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/MOBIQ.2007.4451069"},{"year":"0","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/WOWMOM.2007.4351696"},{"key":"14","article-title":"Making a faster cryptanalytic time-memory trade-off","author":"oechslin","year":"2003","journal-title":"Crypto"},{"key":"11","article-title":"Probabilistic routing protocol for intermittently connected networks","author":"lindgren","year":"2008","journal-title":"IRTF Internet Draft draft-irtf-dtnrg-prophet-00 txt"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/978-0-387-35612-9_9"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/WOWMOM.2007.4351716"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1282427.1282422"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/1128817.1128886"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TMC.2010.246"},{"year":"0","author":"buttya?n","article-title":"Nuglets: A virtual currency to stimulate cooperation in self-organized ad hoc networks","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"5","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Crypto"},{"key":"4","article-title":"Public-key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Eurocrypt"},{"year":"2006","key":"9"},{"key":"8","article-title":"Self-limiting epidemic forwarding","author":"el fawal","year":"2007","journal-title":"IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM)"}],"event":{"name":"2009 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WowMoM)","start":{"date-parts":[[2009,6,15]]},"location":"Kos, Greece","end":{"date-parts":[[2009,6,19]]}},"container-title":["2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5272105\/5282393\/05282445.pdf?arnumber=5282445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:04:25Z","timestamp":1489878265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5282445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2009.5282445","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}