{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:30:49Z","timestamp":1753180249527,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"TELUS Communications Canada"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3140549.3140560","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"111-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Path Hopping"],"prefix":"10.1145","author":[{"given":"Reihaneh","family":"Safavi-Naini","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Alireza","family":"Poostindouz","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Viliam","family":"Lisy","sequence":"additional","affiliation":[{"name":"Czech Technical University, Prague, Czech Rep"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hadi Ahmadi and Reihaneh Safavi-Naini. 2014. Multipath private communication: An information theoretic approach. arXiv preprint arXiv:1401.3659 (2014).  Hadi Ahmadi and Reihaneh Safavi-Naini. 2014. Multipath private communication: An information theoretic approach. arXiv preprint arXiv:1401.3659 (2014)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2012.6378159"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Hoda Maleki Saeed Valizadeh William Koch Azer Bestavros and Marten van Dijk. 2016. Markov Modeling of Moving Target Defense Games. https:\/\/eprint.iacr.org\/2016\/741.pdff.  Hoda Maleki Saeed Valizadeh William Koch Azer Bestavros and Marten van Dijk. 2016. Markov Modeling of Moving Target Defense Games. https:\/\/eprint.iacr.org\/2016\/741.pdff.","DOI":"10.1145\/2995272.2995273"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.137"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-3352-7_32"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/900529"},{"key":"e_1_3_2_1_9_1","unstructured":"Nick Statt. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. https:\/\/arxiv.org\/abs\/quant-ph\/9508027.  Nick Statt. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. https:\/\/arxiv.org\/abs\/quant-ph\/9508027."},{"key":"e_1_3_2_1_10_1","unstructured":"Xiangyun Zhou Lingyang Song and Yan Zhang. 2013. Physical Layer Security in Wireless Communications.  Xiangyun Zhou Lingyang Song and Yan Zhang. 2013. Physical Layer Security in Wireless Communications."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:21Z","timestamp":1750212681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140560"}},"subtitle":["an MTD Strategy for Quantum-safe Communication"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":10,"alternative-id":["10.1145\/3140549.3140560","10.1145\/3140549"],"URL":"https:\/\/doi.org\/10.1145\/3140549.3140560","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}