{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:21:48Z","timestamp":1761740508108,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2011,5]]},"abstract":"<jats:p>Privacy-preserving attribution of IP packets can help balance forensics with an individual's right to privacy.<\/jats:p>","DOI":"10.1145\/1941487.1941508","type":"journal-article","created":{"date-parts":[[2011,4,26]],"date-time":"2011-04-26T12:01:31Z","timestamp":1303819291000},"page":"78-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Privacy-preserving network forensics"],"prefix":"10.1145","volume":"54","author":[{"given":"Mikhail","family":"Afanasyev","sequence":"first","affiliation":[{"name":"Australian Commonwealth Scientific and Research Organization (CSIRO), Brisbane, Australia"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA"}]},{"given":"Justin","family":"Ma","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Nick","family":"Murphy","sequence":"additional","affiliation":[{"name":"Harvard University, Cambridge, MA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Alex C.","family":"Snoeren","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]}],"member":"320","published-online":{"date-parts":[[2011,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_2_1_2_1","volume-title":"Quasi-efficient revocation of group signatures","author":"Ateniese G.","year":"2002","unstructured":"Ateniese , G. , Tsudik , G. , and Song , D . Quasi-efficient revocation of group signatures . In Financial Cryptography, M. Blaze, Ed. (Southampton, Bermuda, Mar . 11--14). Springer-Verlag , Berlin, 2002 , 183--197. Ateniese, G., Tsudik, G., and Song, D. Quasi-efficient revocation of group signatures. In Financial Cryptography, M. Blaze, Ed. (Southampton, Bermuda, Mar. 11--14). Springer-Verlag, Berlin, 2002, 183--197."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the CyberCrime and Digital Law Enforcement Conference","author":"Aucsmith D.","year":"2004","unstructured":"Aucsmith , D. The digital crime scene: A software prospective . In Proceedings of the CyberCrime and Digital Law Enforcement Conference ( New Haven, CT, Mar. 26--28 , 2004 ). Aucsmith, D. The digital crime scene: A software prospective. In Proceedings of the CyberCrime and Digital Law Enforcement Conference (New Haven, CT, Mar. 26--28, 2004)."},{"key":"e_1_2_1_4_1","first-page":"494","volume":"480","author":"Baric N.","year":"1997","unstructured":"Baric , N. and Pfitzmann , B. Collision -free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology EUROCRYPT '97, W. Fumy , Ed. (Konstanz, Germany , May 11--15). Springer-Verlag , Berlin , 1997 , 480 -- 494 . Baric, N. and Pfitzmann, B. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology EUROCRYPT '97, W. Fumy, Ed. (Konstanz, Germany, May 11--15). Springer-Verlag, Berlin, 1997, 480--494.","journal-title":"Berlin"},{"key":"e_1_2_1_5_1","first-page":"629","volume":"614","author":"Bellare M.","year":"2003","unstructured":"Bellare , M. , Micciancio , D. , and Warinschi , B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Advances in Cryptology EUROCRYPT '03, E. Biham , Ed. (Warsaw, May 4--8). Springer-Verlag , Berlin , 2003 , 614 -- 629 . Bellare, M., Micciancio, D., and Warinschi, B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Advances in Cryptology EUROCRYPT '03, E. Biham, Ed. (Warsaw, May 4--8). Springer-Verlag, Berlin, 2003, 614--629.","journal-title":"Berlin"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_2_1_8_1","volume-title":"Advances in Cryptology CRYPTO","author":"Boneh D.","year":"2004","unstructured":"Boneh , D. , Boyen , X. , and Shacham , H . Short group signatures . In Advances in Cryptology CRYPTO 2004 , M. Franklin, Ed . (Santa Barbara, CA, Aug. 15--19). Springer-Verlag , Berlin, 2004, 41--55. Boneh, D., Boyen, X., and Shacham, H. Short group signatures. In Advances in Cryptology CRYPTO 2004, M. Franklin, Ed. (Santa Barbara, CA, Aug. 15--19). Springer-Verlag, Berlin, 2004, 41--55."},{"key":"e_1_2_1_9_1","volume-title":"Advances in Cryptology CRYPTO","author":"Camenisch J.","year":"2002","unstructured":"Camenisch , J. and Lysyanskaya , A . Dynamic accumulators and applications to efficient revocation of anonymous credentials . In Advances in Cryptology CRYPTO 2002 , M. Yung, Ed . (Santa Barbara, CA, Aug. 18--2). Sringer-Verlag , Berlin, Germany, 2002, 61--76. Camenisch, J. and Lysyanskaya, A. Dynamic accumulators and applications to efficient revocation of anonymous credentials. In Advances in Cryptology CRYPTO 2002, M. Yung, Ed. (Santa Barbara, CA, Aug. 18--2). Sringer-Verlag, Berlin, Germany, 2002, 61--76."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957007"},{"key":"e_1_2_1_11_1","first-page":"265","volume":"257","author":"Chaum D.","year":"1991","unstructured":"Chaum , D. and van Heyst , E. Group signatures. In Advances in Cryptology EUROCRYPT '91, D.W. Davies, Ed. (Santa Barbara, CA, Apr. 8--11). Springer-Verlag , Berlin , 1991 , 257 -- 265 . Chaum, D. and van Heyst, E. Group signatures. In Advances in Cryptology EUROCRYPT '91, D.W. Davies, Ed. (Santa Barbara, CA, Apr. 8--11). Springer-Verlag, Berlin, 1991, 257--265.","journal-title":"Berlin"},{"key":"e_1_2_1_12_1","unstructured":"International Telecommunications Union. Traceback Use Cases and Requirements; http:\/\/politechbot.com\/docs\/itu.traceback.use.cases.requirements.091108.txt  International Telecommunications Union. Traceback Use Cases and Requirements; http:\/\/politechbot.com\/docs\/itu.traceback.use.cases.requirements.091108.txt"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the Second Workshop on Steps to Reducing Unwanted Traffic on the Internet","author":"Liu X.","year":"2006","unstructured":"Liu , X. , Yang , X. , Weatherall , D. , and Anderson , T . Efficient and secure source authentication with packet passports . In Proceedings of the Second Workshop on Steps to Reducing Unwanted Traffic on the Internet ( San Jose, CA, July 7). USENIX, Berkeley, CA , 2006 . Liu, X., Yang, X., Weatherall, D., and Anderson, T. Efficient and secure source authentication with packet passports. In Proceedings of the Second Workshop on Steps to Reducing Unwanted Traffic on the Internet (San Jose, CA, July 7). USENIX, Berkeley, CA, 2006."},{"key":"e_1_2_1_15_1","volume-title":"Pairing-Based Cryptography Library","author":"Lynn B.","year":"2006","unstructured":"Lynn , B. Pairing-Based Cryptography Library . Stanford University , Palo Alto, CA , 2006 ; http:\/\/crypto.stanford.edu\/pbc\/ Lynn, B. Pairing-Based Cryptography Library. Stanford University, Palo Alto, CA, 2006; http:\/\/crypto.stanford.edu\/pbc\/"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251327.1251329"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_2_1_18_1","volume-title":"TCP Over WAN Performance Tuning and Troubleshooting","author":"Shalunov S.","year":"2005","unstructured":"Shalunov , S. TCP Over WAN Performance Tuning and Troubleshooting , 2005 ; http:\/\/shlang.com\/writing\/tcp-perf.html Shalunov, S. TCP Over WAN Performance Tuning and Troubleshooting, 2005; http:\/\/shlang.com\/writing\/tcp-perf.html"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the USENIX Security Symposium (Denver, Aug. 14--17)","author":"Zhang Y.","year":"2000","unstructured":"Zhang , Y. and Paxson , V . Detecting stepping stones . In Proceedings of the USENIX Security Symposium (Denver, Aug. 14--17) . USENIX, Berkeley, CA , 2000 , 171--184. Zhang, Y. and Paxson, V. Detecting stepping stones. In Proceedings of the USENIX Security Symposium (Denver, Aug. 14--17). USENIX, Berkeley, CA, 2000, 171--184."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941487.1941508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1941487.1941508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:35Z","timestamp":1750244375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941487.1941508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["10.1145\/1941487.1941508"],"URL":"https:\/\/doi.org\/10.1145\/1941487.1941508","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2011,5]]},"assertion":[{"value":"2011-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}