{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:08:22Z","timestamp":1758845302027,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1145\/3416010.3423216","type":"proceedings-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T18:07:58Z","timestamp":1606241278000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantifying Unlinkability in Multi-hop Wireless Networks"],"prefix":"10.1145","author":[{"given":"Victoria","family":"Manfredi","sequence":"first","affiliation":[{"name":"Wesleyan University, Middletown, CT, USA"}]},{"given":"Cameron","family":"Donnay Hill","sequence":"additional","affiliation":[{"name":"Wesleyan University, Middletown, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0128-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9171-8"},{"key":"e_1_3_2_1_3_1","unstructured":"Matt Blaze John Ioannidis Angelos D Keromytis Tal G Malkin and Avi Rubin. 2009. Anonymity in wireless broadcast networks. (2009).  Matt Blaze John Ioannidis Angelos D Keromytis Tal G Malkin and Avi Rubin. 2009. Anonymity in wireless broadcast networks. (2009)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813628"},{"key":"e_1_3_2_1_6_1","first-page":"17","article-title":"Lectures on spectral graph theory. CBMS Lectures","volume":"6","author":"Chung Fan RK","year":"1996","unstructured":"Fan RK Chung . 1996 . Lectures on spectral graph theory. CBMS Lectures , Fresno 6 (1996), 17 -- 21 . Fan RK Chung. 1996. Lectures on spectral graph theory. CBMS Lectures, Fresno 6 (1996), 17--21.","journal-title":"Fresno"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.12.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881162"},{"key":"e_1_3_2_1_10_1","volume-title":"Tor: The secondgeneration onion router. Technical Report. Naval Research Lab Washington DC.","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine , Nick Mathewson , and Paul Syverson . 2004 . Tor: The secondgeneration onion router. Technical Report. Naval Research Lab Washington DC. Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The secondgeneration onion router. Technical Report. Naval Research Lab Washington DC."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456421"},{"key":"e_1_3_2_1_13_1","volume-title":"Topics in Cryptology -- CT-RSA","author":"Golle Philippe","year":"2004","unstructured":"Philippe Golle , Markus Jakobsson , Ari Juels , and Paul Syverson . 2004. Universal Re-encryption for Mixnets . In Topics in Cryptology -- CT-RSA 2004 . 163--178. Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson. 2004. Universal Re-encryption for Mixnets. In Topics in Cryptology -- CT-RSA 2004. 163--178."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.220"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060777"},{"key":"e_1_3_2_1_16_1","series-title":"Series D","volume-title":"A New Approach to Linear Filtering and Prediction Problems. Transactions of the ASME--Journal of Basic Engineering 82","author":"Kalman Rudolph Emil","year":"1960","unstructured":"Rudolph Emil Kalman . 1960. A New Approach to Linear Filtering and Prediction Problems. Transactions of the ASME--Journal of Basic Engineering 82 , Series D ( 1960 ), 35--45. Rudolph Emil Kalman. 1960. A New Approach to Linear Filtering and Prediction Problems. Transactions of the ASME--Journal of Basic Engineering 82, Series D (1960), 35--45."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778449"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Third Workshop on Privacy Enhancing Technologies.","author":"K\u00f6psell Stefan","year":"2003","unstructured":"Stefan K\u00f6psell and Sandra Steinbrecher . 2003 . Modeling unlinkability . In Proceedings of the Third Workshop on Privacy Enhancing Technologies. Stefan K\u00f6psell and Sandra Steinbrecher. 2003. Modeling unlinkability. In Proceedings of the Third Workshop on Privacy Enhancing Technologies."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25"},{"volume-title":"Traffic inference in anonymous manets","author":"Liu Yunzhong","key":"e_1_3_2_1_20_1","unstructured":"Yunzhong Liu , Rui Zhang , Jing Shi , and Yanchao Zhang . 2010. Traffic inference in anonymous manets . In IEEE SECON. Yunzhong Liu, Rui Zhang, Jing Shi, and Yanchao Zhang. 2010. Traffic inference in anonymous manets. In IEEE SECON."},{"key":"e_1_3_2_1_21_1","volume-title":"FKF: Fast Kalman Filter. R package version 0.1.5. https:\/\/cran.r-project.org\/web\/packages\/FKF\/index.html","author":"Luethi David","year":"2018","unstructured":"David Luethi , Philipp Erb , and Simon Otziger . 2018 . FKF: Fast Kalman Filter. R package version 0.1.5. https:\/\/cran.r-project.org\/web\/packages\/FKF\/index.html (2018). David Luethi, Philipp Erb, and Simon Otziger. 2018. FKF: Fast Kalman Filter. R package version 0.1.5. https:\/\/cran.r-project.org\/web\/packages\/FKF\/index.html (2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633041"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653683"},{"key":"e_1_3_2_1_24_1","volume-title":"Pisces: Anonymous communication using social networks. arXiv preprint arXiv:1208.6326","author":"Mittal Prateek","year":"2012","unstructured":"Prateek Mittal , Matthew Wright , and Nikita Borisov . 2012 . Pisces: Anonymous communication using social networks. arXiv preprint arXiv:1208.6326 (2012). Prateek Mittal, Matthew Wright, and Nikita Borisov. 2012. Pisces: Anonymous communication using social networks. arXiv preprint arXiv:1208.6326 (2012)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.041"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13601-6_8"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779346"},{"key":"e_1_3_2_1_28_1","unstructured":"Open Garden. 2019. Firechat Messaging App. https:\/\/en.wikipedia.org\/wiki\/FireChat.  Open Garden. 2019. Firechat Messaging App. https:\/\/en.wikipedia.org\/wiki\/FireChat."},{"key":"e_1_3_2_1_29_1","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. Terminology for Talking about Privacy by Data Minimization: Anonymity Unlinkability Undetectability Unobservability Pseudonymity and Identity Management Internet Draft (Expired). https:\/\/tools.ietf.org\/id\/draft-hansen-privacy-terminology-00.html.  Andreas Pfitzmann and Marit Hansen. 2010. Terminology for Talking about Privacy by Data Minimization: Anonymity Unlinkability Undetectability Unobservability Pseudonymity and Identity Management Internet Draft (Expired). https:\/\/tools.ietf.org\/id\/draft-hansen-privacy-terminology-00.html."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.33"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167260"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Albert Reuther Jeremy Kepner Chansup Byun Siddharth Samsi William Arcand David Bestor Bill Bergeron Vijay Gadepally Michael Houle Matthew Hubbell etal 2018. Interactive supercomputing on 40 000 cores for machine learning and data analysis. In 2018 IEEE High Performance extreme Computing Conference (HPEC). IEEE 1--6.  Albert Reuther Jeremy Kepner Chansup Byun Siddharth Samsi William Arcand David Bestor Bill Bergeron Vijay Gadepally Michael Houle Matthew Hubbell et al. 2018. Interactive supercomputing on 40 000 cores for machine learning and data analysis. In 2018 IEEE High Performance extreme Computing Conference (HPEC). IEEE 1--6.","DOI":"10.1109\/HPEC.2018.8547629"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.104"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179611"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111572.1111580"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/647596.731690"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653707"},{"key":"e_1_3_2_1_38_1","unstructured":"Validity Labs. 2020. HOPR Messaging App. https:\/\/hopr.network\/.  Validity Labs. 2020. HOPR Messaging App. https:\/\/hopr.network\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1996.10476697"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/897831"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.146"}],"event":{"name":"MSWiM '20: 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Alicante Spain","acronym":"MSWiM '20"},"container-title":["Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416010.3423216","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3416010.3423216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:43Z","timestamp":1750197763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416010.3423216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":42,"alternative-id":["10.1145\/3416010.3423216","10.1145\/3416010"],"URL":"https:\/\/doi.org\/10.1145\/3416010.3423216","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]},"assertion":[{"value":"2020-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}