{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:49Z","timestamp":1750306309158,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["N01347"],"award-info":[{"award-number":["N01347"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841123","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"124-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Peace vs. Privacy"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Mannan","sequence":"first","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada"}]},{"given":"Arash","family":"Shahkar","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada"}]},{"given":"Atieh Saberi","family":"Pirouz","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada"}]},{"given":"Vladimir","family":"Rabotka","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"49","article-title":"post-September 11 intelligence alliances","volume":"24","author":"Aldrich R. J.","year":"2002","unstructured":"R. J. Aldrich . Dangerous liaisons : post-September 11 intelligence alliances . Harvard International Review , 24 ( 3 ): 49 -- 54 , Sept. 2002 . R. J. Aldrich. Dangerous liaisons: post-September 11 intelligence alliances. Harvard International Review, 24(3):49--54, Sept. 2002.","journal-title":"Harvard International Review"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076777"},{"key":"e_1_3_2_1_6_1","volume-title":"charges five Chinese military officers with spying. News article (May 19","author":"U.","year":"2014","unstructured":"Bloomberg.com. U. S. charges five Chinese military officers with spying. News article (May 19 , 2014 ). http:\/\/www.bloomberg.com\/news\/2014-05-19\/u-s-said-to-charge-chinese-military-officers-with-online-spying.html. Bloomberg.com. U. S. charges five Chinese military officers with spying. News article (May 19, 2014). http:\/\/www.bloomberg.com\/news\/2014-05-19\/u-s-said-to-charge-chinese-military-officers-with-online-spying.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11961635_8"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX NSDI'12","author":"Cao Q.","year":"2012","unstructured":"Q. Cao , M. Sirivianos , X. Yang , and T. Pregueiro . Aiding the detection of fake accounts in large scale social online services . In USENIX NSDI'12 , San Jose, CA, USA , 2012 . Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In USENIX NSDI'12, San Jose, CA, USA, 2012."},{"volume-title":"Users flock to anonymizing services after NSA snooping reports. News article (Oct. 10","year":"2013","key":"e_1_3_2_1_10_1","unstructured":"ComputerWorld.com. Users flock to anonymizing services after NSA snooping reports. News article (Oct. 10 , 2013 ). http:\/\/www.computerworld.com\/s\/article\/9243141\/Users_flock_to_anonymizing_services_after_NSA_snooping_reports. ComputerWorld.com. Users flock to anonymizing services after NSA snooping reports. News article (Oct. 10, 2013). http:\/\/www.computerworld.com\/s\/article\/9243141\/Users_flock_to_anonymizing_services_after_NSA_snooping_reports."},{"volume-title":"Mining PGP key servers. Mailing list discussion (July 21","year":"2013","key":"e_1_3_2_1_11_1","unstructured":"Cryptome.org. Mining PGP key servers. Mailing list discussion (July 21 , 2013 ). http:\/\/cryptome.org\/2013\/07\/mining-pgp-keyservers.htm. Cryptome.org. Mining PGP key servers. Mailing list discussion (July 21, 2013). http:\/\/cryptome.org\/2013\/07\/mining-pgp-keyservers.htm."},{"volume-title":"After Snowden leaks, daily adoption rate of PGP encryption triples. News article (July 31","year":"2013","key":"e_1_3_2_1_12_1","unstructured":"Dailydot.com. After Snowden leaks, daily adoption rate of PGP encryption triples. News article (July 31 , 2013 ). http:\/\/www.dailydot.com\/news\/pgp-encryption-snowden-prism-nsa\/. Dailydot.com. After Snowden leaks, daily adoption rate of PGP encryption triples. News article (July 31, 2013). http:\/\/www.dailydot.com\/news\/pgp-encryption-snowden-prism-nsa\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_14_1","volume-title":"May","author":"Dworkin M.","year":"2004","unstructured":"M. Dworkin . Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality (NIST SP 800-38C) , May 2004 . M. Dworkin. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality (NIST SP 800-38C), May 2004."},{"key":"e_1_3_2_1_15_1","volume-title":"NDSS'13","author":"Egele M.","year":"2013","unstructured":"M. Egele , G. Stringhini , C. Kruegel , and G. Vigna . COMPA: Detecting compromised accounts on social networks . In NDSS'13 , San Diego, CA, USA , 2013 . M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. COMPA: Detecting compromised accounts on social networks. In NDSS'13, San Diego, CA, USA, 2013."},{"volume-title":"Clipper encryption -- AT&T telephone security device model 3600. Secret briefing document obtained by EPIC by using the US Freedom of Information Act (Feb. 9","year":"1993","key":"e_1_3_2_1_16_1","unstructured":"EPIC.org. Clipper encryption -- AT&T telephone security device model 3600. Secret briefing document obtained by EPIC by using the US Freedom of Information Act (Feb. 9 , 1993 ), https:\/\/epic.org\/crypto\/clipper\/foia\/att3600_2_9_93.html. EPIC.org. Clipper encryption -- AT&T telephone security device model 3600. Secret briefing document obtained by EPIC by using the US Freedom of Information Act (Feb. 9, 1993), https:\/\/epic.org\/crypto\/clipper\/foia\/att3600_2_9_93.html."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2309996.2310022"},{"key":"e_1_3_2_1_18_1","volume-title":"Conference on Digital Government Research","author":"Garfinkel S. L.","year":"2003","unstructured":"S. L. Garfinkel . Enabling email confidentiality through the use of opportunistic encryption . In Conference on Digital Government Research , Boston, USA , 2003 . S. L. Garfinkel. Enabling email confidentiality through the use of opportunistic encryption. In Conference on Digital Government Research, Boston, USA, 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium","author":"Geambasu R.","year":"2009","unstructured":"R. Geambasu , T. Kohno , A. Levy , and H. M. Levy . Vanish: Increasing data privacy with self-destructing data . In USENIX Security Symposium , Montreal, Canada , Aug. 2009 . R. Geambasu, T. Kohno, A. Levy, and H. M. Levy. Vanish: Increasing data privacy with self-destructing data. In USENIX Security Symposium, Montreal, Canada, Aug. 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"Blog article (Sept. 18","author":"Green M.","year":"2013","unstructured":"M. Green . The many flaws of Dual_EC_DRBG. Blog article (Sept. 18 , 2013 ). http:\/\/blog.cryptographyengineering.com\/2013\/09\/the-many-flaws-of-dualecdrbg.html. M. Green. The many flaws of Dual_EC_DRBG. Blog article (Sept. 18, 2013). http:\/\/blog.cryptographyengineering.com\/2013\/09\/the-many-flaws-of-dualecdrbg.html."},{"key":"e_1_3_2_1_22_1","volume-title":"Security warnings for suspected state-sponsored attacks. Google online security blog (June 5","author":"Grosse E.","year":"2012","unstructured":"E. Grosse . Security warnings for suspected state-sponsored attacks. Google online security blog (June 5 , 2012 ). http:\/\/googleonlinesecurity.blogspot.ca\/2012\/06\/security-warnings-for-suspected-state.html. E. Grosse. Security warnings for suspected state-sponsored attacks. Google online security blog (June 5, 2012). http:\/\/googleonlinesecurity.blogspot.ca\/2012\/06\/security-warnings-for-suspected-state.html."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2181534"},{"volume-title":"man in the middle' attack on our data. News article (Feb. 5","year":"2012","key":"e_1_3_2_1_24_1","unstructured":"ITWorld.com. Facebook's ` man in the middle' attack on our data. News article (Feb. 5 , 2012 ). http:\/\/www.itworld.com\/it-managementstrategy\/247344\/facebooks-man-middle-attack-our-data. ITWorld.com. Facebook's `man in the middle' attack on our data. News article (Feb. 5, 2012). http:\/\/www.itworld.com\/it-managementstrategy\/247344\/facebooks-man-middle-attack-our-data."},{"key":"e_1_3_2_1_25_1","volume-title":"War Before Civilization: The Myth of the Peaceful Savage","author":"Keeley L. H.","year":"1996","unstructured":"L. H. Keeley . War Before Civilization: The Myth of the Peaceful Savage . Oxford University Press , 1996 . L. H. Keeley. War Before Civilization: The Myth of the Peaceful Savage. Oxford University Press, 1996."},{"key":"e_1_3_2_1_26_1","volume-title":"Oct.","author":"Koch W.","year":"2011","unstructured":"W. Koch and M. Brinkmann . STEED -- usable end-to-end encryption , Oct. 2011 . http:\/\/g10code.com\/steed.html. W. Koch and M. Brinkmann. STEED -- usable end-to-end encryption, Oct. 2011. http:\/\/g10code.com\/steed.html."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2005.09.009"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520624"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium","author":"Lau B.","year":"2014","unstructured":"B. Lau , P. H. Chung , C. Song , Y. Jang , W. Lee , and A. Boldyreva . Mimesis aegis: A mimicry privacy shield - a system's approach to data privacy on public cloud . In USENIX Security Symposium , San Diego, CA, USA , Aug. 2014 . B. Lau, P. H. Chung, C. Song, Y. Jang, W. Lee, and A. Boldyreva. Mimesis aegis: A mimicry privacy shield - a system's approach to data privacy on public cloud. In USENIX Security Symposium, San Diego, CA, USA, Aug. 2014."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280696"},{"key":"e_1_3_2_1_31_1","volume-title":"IEEE INFOCOM","author":"Lou W.","year":"2004","unstructured":"W. Lou . Spread : Enhancing data confidentiality in mobile ad hoc networks . In IEEE INFOCOM , 2004 . W. Lou. Spread: Enhancing data confidentiality in mobile ad hoc networks. In IEEE INFOCOM, 2004."},{"key":"e_1_3_2_1_32_1","volume-title":"War--ancient history encyclopedia. Online article (Sept. 2","author":"Mark J. J.","year":"2009","unstructured":"J. J. Mark . War--ancient history encyclopedia. Online article (Sept. 2 , 2009 ). http:\/\/www.ancient.eu.com\/war\/. J. J. Mark. War--ancient history encyclopedia. Online article (Sept. 2, 2009). http:\/\/www.ancient.eu.com\/war\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Universit\u00e9 Laval","author":"M\u00e9nard M.","year":"2014","unstructured":"M. M\u00e9nard . Hidden cooperation : How nuclear antagonists collaborated on counter-narcotics efforts in Iran from 2007 to 2011. Master's thesis , Universit\u00e9 Laval , Qu\u00e9bec, Canada , 2014 . M. M\u00e9nard. Hidden cooperation: How nuclear antagonists collaborated on counter-narcotics efforts in Iran from 2007 to 2011. Master's thesis, Universit\u00e9 Laval, Qu\u00e9bec, Canada, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_3_2_1_36_1","volume-title":"BC","author":"Obar J. A.","year":"2013","unstructured":"J. A. Obar and A. Clement . Internet surveillance and boomerang routing : A call for Canadian network sovereignty. In Technology and Emerging Media Track (TEM'13), Victoria , BC , Canada , June 2013 . J. A. Obar and A. Clement. Internet surveillance and boomerang routing : A call for Canadian network sovereignty. In Technology and Emerging Media Track (TEM'13), Victoria, BC, Canada, June 2013."},{"key":"e_1_3_2_1_37_1","volume-title":"Feb.","author":"Oren Y.","year":"2009","unstructured":"Y. Oren and A. Wool . Perfect privacy for webmail with secret sharing. Technical report , Feb. 2009 . http:\/\/www.eng.tau.ac.il\/~yash\/OrenWool-SPEmail.pdf. Y. Oren and A. Wool. Perfect privacy for webmail with secret sharing. Technical report, Feb. 2009. http:\/\/www.eng.tau.ac.il\/~yash\/OrenWool-SPEmail.pdf."},{"key":"e_1_3_2_1_38_1","unstructured":"P. Pennock. Trusting PGP. USENIX; login: 38(6):33--35 Dec. 2013.  P. Pennock. Trusting PGP. USENIX; login: 38(6):33--35 Dec. 2013."},{"issue":"1","key":"e_1_3_2_1_39_1","article-title":"Crouching tiger, hidden jargon: The Sino-Russian strategic partnership","volume":"3","author":"Person R.","year":"2001","unstructured":"R. Person . Crouching tiger, hidden jargon: The Sino-Russian strategic partnership . Stanford Journal of International Relations , 3 ( 1 ), 2001 . R. Person. Crouching tiger, hidden jargon: The Sino-Russian strategic partnership. Stanford Journal of International Relations, 3(1), 2001.","journal-title":"Stanford Journal of International Relations"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470061602.eqf01010"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23379"},{"key":"e_1_3_2_1_43_1","volume-title":"how the NSA targets users' online anonymity. News article (Oct. 4","author":"Schneier B.","year":"2013","unstructured":"B. Schneier . Attacking Tor : how the NSA targets users' online anonymity. News article (Oct. 4 , 2013 ). http:\/\/www.theguardian.com\/world\/2013\/oct\/04\/tor-attacks-nsa-users-online-anonymity. B. Schneier. Attacking Tor: how the NSA targets users' online anonymity. News article (Oct. 4, 2013). http:\/\/www.theguardian.com\/world\/2013\/oct\/04\/tor-attacks-nsa-users-online-anonymity."},{"key":"e_1_3_2_1_44_1","volume-title":"Applied Cryptography","author":"Schneier B.","year":"1996","unstructured":"B. Schneier . Applied Cryptography . John Wiley & Sons , 2 edition, 1996 . B. Schneier. Applied Cryptography. John Wiley & Sons, 2 edition, 1996."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_20"},{"key":"e_1_3_2_1_47_1","first-page":"745","article-title":"I","volume":"44","author":"Solove D. J.","year":"2007","unstructured":"D. J. Solove . ` I 've got nothing to hide' and other misunderstandings of privacy. San Diego Law Review , 44 : 745 -- 772 , July 2007 . D. J. Solove. `I've got nothing to hide' and other misunderstandings of privacy. San Diego Law Review, 44:745--772, July 2007.","journal-title":"San Diego Law Review"},{"key":"e_1_3_2_1_48_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Song D.","year":"2000","unstructured":"D. Song , D. Wagner , and A. Perrig . Practical techniques for searches on encrypted data . In IEEE Symposium on Security and Privacy , May 2000 . D. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, May 2000."},{"volume-title":"Targeting Huawei: NSA spied on Chinese government and networking firm. News article (Mar. 22","year":"2014","key":"e_1_3_2_1_49_1","unstructured":"Spiegel.de. Targeting Huawei: NSA spied on Chinese government and networking firm. News article (Mar. 22 , 2014 ). http:\/\/www.spiegel.de\/international\/world\/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html. Spiegel.de. Targeting Huawei: NSA spied on Chinese government and networking firm. News article (Mar. 22, 2014). http:\/\/www.spiegel.de\/international\/world\/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.42"},{"volume-title":"Russia moves to ban online services that don't store personal data in Russia. News article (July 2","year":"2014","key":"e_1_3_2_1_51_1","unstructured":"TechCrunch.com. Russia moves to ban online services that don't store personal data in Russia. News article (July 2 , 2014 ), http:\/\/techcrunch.com\/2014\/07\/02\/russia-moves-to-ban-online-services-that-dont-store-personal-data-in-russia\/. TechCrunch.com. Russia moves to ban online services that don't store personal data in Russia. News article (July 2, 2014), http:\/\/techcrunch.com\/2014\/07\/02\/russia-moves-to-ban-online-services-that-dont-store-personal-data-in-russia\/."},{"volume-title":"The NSA files: How the story unfolded. Guardian news archive (from","year":"2013","key":"e_1_3_2_1_52_1","unstructured":"TheGuardian.com. The NSA files: How the story unfolded. Guardian news archive (from June 5, 2013 ). http:\/\/www.theguardian.com\/world\/the-nsa-files. TheGuardian.com. The NSA files: How the story unfolded. Guardian news archive (from June 5, 2013). http:\/\/www.theguardian.com\/world\/the-nsa-files."},{"volume-title":"NSA Prism program slides. Leaked Prism slides (Nov. 1","year":"2013","key":"e_1_3_2_1_53_1","unstructured":"TheGuardian.com. NSA Prism program slides. Leaked Prism slides (Nov. 1 , 2013 ). http:\/\/www.theguardian.com\/world\/interactive\/2013\/nov\/01\/prism-slides-nsa-document. TheGuardian.com. NSA Prism program slides. Leaked Prism slides (Nov. 1, 2013). http:\/\/www.theguardian.com\/world\/interactive\/2013\/nov\/01\/prism-slides-nsa-document."},{"volume-title":"Revealed: how US and UK spy agencies defeat internet privacy and security. News article (Sept. 6","year":"2013","key":"e_1_3_2_1_54_1","unstructured":"TheGuardian.com. Revealed: how US and UK spy agencies defeat internet privacy and security. News article (Sept. 6 , 2013 ). http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-gchq-encryption-codes-security\/print. TheGuardian.com. Revealed: how US and UK spy agencies defeat internet privacy and security. News article (Sept. 6, 2013). http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-gchq-encryption-codes-security\/print."},{"volume-title":"lies and Snowden's email: why I was forced to shut down Lavabit. News article (May 20","year":"2014","key":"e_1_3_2_1_55_1","unstructured":"TheGuardian.com. Secrets , lies and Snowden's email: why I was forced to shut down Lavabit. News article (May 20 , 2014 ). http:\/\/www.theguardian.com\/commentisfree\/2014\/may\/20\/why-did-lavabit-shut-down-snowden-email. TheGuardian.com. Secrets, lies and Snowden's email: why I was forced to shut down Lavabit. News article (May 20, 2014). http:\/\/www.theguardian.com\/commentisfree\/2014\/may\/20\/why-did-lavabit-shut-down-snowden-email."},{"key":"e_1_3_2_1_56_1","volume-title":"Feb.","author":"Tracy M.","year":"2007","unstructured":"M. Tracy , W. Jansen , K. Scarfone , and J. Butterfield . Guidelines on electronic mail security (NIST SP 800-45 Version 2) , Feb. 2007 . http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-45-version2\/SP800-45v2.pdf. M. Tracy, W. Jansen, K. Scarfone, and J. Butterfield. Guidelines on electronic mail security (NIST SP 800-45 Version 2), Feb. 2007. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-45-version2\/SP800-45v2.pdf."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12027-015-0379-y"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"volume-title":"NSA-proof encryption exists. why doesn't anyone use it? Blog article (June 14","year":"2013","key":"e_1_3_2_1_59_1","unstructured":"WashingtonPost.com. NSA-proof encryption exists. why doesn't anyone use it? Blog article (June 14 , 2013 ). WashingtonPost.com. NSA-proof encryption exists. why doesn't anyone use it? Blog article (June 14, 2013)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979457"},{"key":"e_1_3_2_1_61_1","volume-title":"USENIX Security Symposium","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. D. Tygar . Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . In USENIX Security Symposium , Washington, DC, USA , Aug. 1999 . A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In USENIX Security Symposium, Washington, DC, USA, Aug. 1999."},{"key":"e_1_3_2_1_62_1","volume-title":"NDSS'10","author":"Wolchok S.","year":"2010","unstructured":"S. Wolchok , O. S. Hofmann , N. Heninge , E. W. Felten , J. A. Halderman , C. J. Rossbach , B. Waters , and E. Witchel . Defeating Vanish with low-cost sybil attacks against large DHTs . In NDSS'10 , San Diego, CA, USA , 2010 . S. Wolchok, O. S. Hofmann, N. Heninge, E. W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel. Defeating Vanish with low-cost sybil attacks against large DHTs. In NDSS'10, San Diego, CA, USA, 2010."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.76"},{"volume-title":"Former NSA executive: Snowden leaks caused `significant disservice' to the Internet. News article (Apr. 24","year":"2014","key":"e_1_3_2_1_64_1","unstructured":"ZDNet.com. Former NSA executive: Snowden leaks caused `significant disservice' to the Internet. News article (Apr. 24 , 2014 ). ZDNet.com. Former NSA executive: Snowden leaks caused `significant disservice' to the Internet. News article (Apr. 24, 2014)."}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Twente Netherlands","acronym":"NSPW '15"},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841123","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841123"}},"subtitle":["Leveraging Conflicting Jurisdictions for Email Security"],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":61,"alternative-id":["10.1145\/2841113.2841123","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841123","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}