{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:20:22Z","timestamp":1762032022044,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia - FCT","award":["SFRH\/BD\/136967\/2018,UIDB\/50021\/2020"],"award-info":[{"award-number":["SFRH\/BD\/136967\/2018,UIDB\/50021\/2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3428662.3428788","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T05:06:23Z","timestamp":1609823183000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels"],"prefix":"10.1145","author":[{"given":"Diogo","family":"Barradas","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa"}]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749215.2749223"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0037"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277217"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417874"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644900"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363189"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655204"},{"key":"e_1_3_2_1_8_1","unstructured":"Ian Clarke Oskar Sandberg Matthew Toseland and Vilhelm Verendel. 2010. Private communication through a network of trusted connections: The dark freenet. Network.  Ian Clarke Oskar Sandberg Matthew Toseland and Vilhelm Verendel. 2010. Private communication through a network of trusted connections: The dark freenet. Network."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_21"},{"volume":"201","journal-title":"J. Wright.","author":"Darer A.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Roger Dingledine. 2012. Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race. Accessed: 2020-09-21.  Roger Dingledine. 2012. Obfsproxy: the next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race. Accessed: 2020-09-21."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0028"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24340"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855110"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0075"},{"key":"e_1_3_2_1_23_1","unstructured":"W3C. 2020. WebRTC 1.0. https:\/\/www.w3.org\/TR\/webrtc\/. Accessed: 2020-09-21.  W3C. 2020. WebRTC 1.0. https:\/\/www.w3.org\/TR\/webrtc\/. Accessed: 2020-09-21."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278551"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335711"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978365"}],"event":{"name":"Middleware '20: 21st International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP"],"location":"Delft Netherlands","acronym":"Middleware '20"},"container-title":["Proceedings of the 1st International Workshop on Distributed Infrastructure for Common Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428662.3428788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428662.3428788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:59Z","timestamp":1750197719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428662.3428788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":27,"alternative-id":["10.1145\/3428662.3428788","10.1145\/3428662"],"URL":"https:\/\/doi.org\/10.1145\/3428662.3428788","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}