{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:46Z","timestamp":1750307626070,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1454586.1454595","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T12:18:35Z","timestamp":1225196315000},"page":"51-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The cost of protecting privacy in multimedia applications"],"prefix":"10.1145","author":[{"given":"Khalil","family":"El-Khatib","sequence":"first","affiliation":[{"name":"University of Ontario Institute of Technology, OShawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163698.1163705"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/116825.116852"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_19"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.eskimo.com\/~weidai\/benchmarks.html  http:\/\/www.eskimo.com\/~weidai\/benchmarks.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301312"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_9_1","first-page":"369","article-title":"Oblivious Polynomial Evaluation and Oblivious Neural Learning","volume":"2001","author":"Chang Y.C.","unstructured":"Y.C. Chang , and C.J. Lu , \" Oblivious Polynomial Evaluation and Oblivious Neural Learning ,\" ASIACRYPT 2001 : 369 -- 384 Y.C. Chang, and C.J. Lu, \"Oblivious Polynomial Evaluation and Oblivious Neural Learning,\" ASIACRYPT 2001: 369--384","journal-title":"ASIACRYPT"},{"key":"e_1_3_2_1_10_1","volume-title":"CRYPTO","author":"Gilboa N.","year":"1999","unstructured":"N. Gilboa , \"Two party RSA key generation \", CRYPTO 1999 , 116--129. N. Gilboa, \"Two party RSA key generation\", CRYPTO 1999, 116--129."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/795666.796556"},{"key":"e_1_3_2_1_12_1","volume-title":"SIP: Session Initiation Protocol,\" RFC","author":"Rosenberg J.","year":"2002","unstructured":"J. Rosenberg , H. Schulzrinne , G. Camarillo , A. Johnston , J. Peterson , R. Sparks , M. Handley , and E. Schooler , \" SIP: Session Initiation Protocol,\" RFC 3261, June 2002 . J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, \"SIP: Session Initiation Protocol,\" RFC 3261, June 2002."},{"key":"e_1_3_2_1_13_1","volume-title":"RFC","author":"Handley M.","year":"1998","unstructured":"M. Handley and V. Jacobson , \" SDP: Session Description Protocol \", RFC 2327, April 1998 . M. Handley and V. Jacobson, \"SDP: Session Description Protocol\", RFC 2327, April 1998."},{"key":"e_1_3_2_1_14_1","volume-title":"Work in Progress","author":"Kutscher D.","year":"2003","unstructured":"D. Kutscher , J. Ott , C. Bormann , \"Session Description and Capability Negotiation,\" Internet Draft draft-ietf-mmusic-sdpng-07.txt , Work in Progress ; October 2003 D. Kutscher, J. Ott, C. Bormann, \"Session Description and Capability Negotiation,\" Internet Draft draft-ietf-mmusic-sdpng-07.txt, Work in Progress; October 2003"},{"key":"e_1_3_2_1_16_1","volume-title":"Quality of Security Service: Adaptive Security\", to appear in The Handbook of Information Security","author":"Levin T. E.","year":"2005","unstructured":"T. E. Levin , C. E. Irvine , and E. Spyropoulou , \" Quality of Security Service: Adaptive Security\", to appear in The Handbook of Information Security , John Wiley & Sons, Inc. December 2005 T. E. Levin, C. E. Irvine, and E. Spyropoulou, \"Quality of Security Service: Adaptive Security\", to appear in The Handbook of Information Security, John Wiley & Sons, Inc. December 2005"},{"key":"e_1_3_2_1_17_1","volume-title":"Cancun","author":"Irvine C.","year":"2000","unstructured":"C. Irvine and T. Levin . \" Toward Quality of Security Service in a Resource Management System Benefit Function,\" Proceedings of the Heterogeneous Computing Workshop . Cancun , Mexico , 2000 . C. Irvine and T. Levin. \"Toward Quality of Security Service in a Resource Management System Benefit Function,\" Proceedings of the Heterogeneous Computing Workshop. Cancun, Mexico, 2000."},{"key":"e_1_3_2_1_18_1","first-page":"18","volume-title":"A QoS Performance Measure Framework for Distributed Heterogeneous Networks,\" in Proceedings of the Eighth Euromicro Workshop on Parallel and Distributed Processing","author":"Kim J.","year":"2000","unstructured":"J. Kim , D. Hensgen , T. Kidd , H. Siegel , D. St. John , C. Irvine , T. Levin , N. Porter , V. Prasanna , and R. Freund . \" A QoS Performance Measure Framework for Distributed Heterogeneous Networks,\" in Proceedings of the Eighth Euromicro Workshop on Parallel and Distributed Processing . pages 18 -- 27 . Rhodes , Greece . ( 2000 ). J. Kim, D. Hensgen, T. Kidd, H. Siegel, D. St. John, C. Irvine, T. Levin, N. Porter, V. Prasanna, and R. Freund. \"A QoS Performance Measure Framework for Distributed Heterogeneous Networks,\" in Proceedings of the Eighth Euromicro Workshop on Parallel and Distributed Processing. pages 18--27. Rhodes, Greece. (2000)."},{"key":"e_1_3_2_1_19_1","volume-title":"Generic Security Service Application Program Interface,\" IETF RFC 1508","author":"Linn J.","year":"1993","unstructured":"J. Linn ( 1993 ), \" Generic Security Service Application Program Interface,\" IETF RFC 1508 . J. Linn (1993), \"Generic Security Service Application Program Interface,\" IETF RFC 1508."},{"key":"e_1_3_2_1_20_1","unstructured":"A. N. Alghannam M. E. Woodward J.E. Mellor \"Security As A QoS Routing Issue \" Computing Dept. \/ University of Bradford  A. N. Alghannam M. E. Woodward J.E. Mellor \"Security As A QoS Routing Issue \" Computing Dept. \/ University of Bradford"}],"event":{"name":"MSWiM '08: The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Vancouver British Columbia Canada","acronym":"MSWiM '08"},"container-title":["Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454586.1454595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1454586.1454595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:54Z","timestamp":1750250754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454586.1454595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":19,"alternative-id":["10.1145\/1454586.1454595","10.1145\/1454586"],"URL":"https:\/\/doi.org\/10.1145\/1454586.1454595","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}