{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:11Z","timestamp":1750306751277,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2507908.2507915","type":"proceedings-article","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T19:30:29Z","timestamp":1383766229000},"page":"83-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Foreseen risks for network coding based surveillance applications"],"prefix":"10.1145","author":[{"given":"Vahid","family":"Talooki","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Aveiro - Portugal, Portugal"}]},{"given":"Daniel E.","family":"Lucani","sequence":"additional","affiliation":[{"name":"Aalborg University, Aalborg, Denmark, Denmark"}]},{"given":"Hugo","family":"Marques","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Aveiro - Portugal, Portugal"}]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Aveiro - Portugal, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177562"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100409"},{"key":"e_1_3_2_1_4_1","first-page":"1366","article-title":"Network Coding Security: Attacks and Countermeasures","volume":"0809","author":"Lima L.","year":"2008","unstructured":"L. Lima , J. Vilela , P. Oliveira , and J. Barros , \" Network Coding Security: Attacks and Countermeasures ,\" CoRR , vol. abs\/ 0809 . 1366 , 2008 . L. Lima, J. Vilela, P. Oliveira, and J. Barros, \"Network Coding Security: Attacks and Countermeasures,\" CoRR, vol. abs\/0809.1366, 2008.","journal-title":"CoRR"},{"key":"e_1_3_2_1_5_1","volume-title":"43rd Annual Allerton Conf. Commun. Control Comput.","author":"Katti S.","year":"2006","unstructured":"S. Katti , D. Katabi , W. Hu , H. S. Rahul , and M. M\u00e9dard , \" The importance of being opportunistic: Practical network coding for wireless environments,\" presented in Proc . 43rd Annual Allerton Conf. Commun. Control Comput. , 2006 . S. Katti, D. Katabi, W. Hu, H. S. Rahul, and M. M\u00e9dard, \"The importance of being opportunistic: Practical network coding for wireless environments,\" presented in Proc. 43rd Annual Allerton Conf. Commun. Control Comput., 2006."},{"key":"e_1_3_2_1_6_1","first-page":"262","volume-title":"Hide and code: Session anonymity in wireless line networks with coded packets,\" in Information Theory and Applications Workshop (ITA)","author":"Sousa-Pinto H.","year":"2012","unstructured":"H. Sousa-Pinto , D. E. Lucani , and J. Barros , \" Hide and code: Session anonymity in wireless line networks with coded packets,\" in Information Theory and Applications Workshop (ITA) , 2012 , 2012, pp. 262 -- 268 . H. Sousa-Pinto, D. E. Lucani, and J. Barros, \"Hide and code: Session anonymity in wireless line networks with coded packets,\" in Information Theory and Applications Workshop (ITA), 2012, 2012, pp. 262--268."},{"key":"e_1_3_2_1_7_1","first-page":"226","volume-title":"On-the-fly verification of rateless erasure codes for efficient content distribution,\" in IEEE Symp. on Security and Privacy","author":"Krohn M. N.","year":"2004","unstructured":"M. N. Krohn , M. J. Freedman , and D. Mazieres , \" On-the-fly verification of rateless erasure codes for efficient content distribution,\" in IEEE Symp. on Security and Privacy , pp. 226 -- 240 , 2004 , 2004, pp. 226--240. M. N. Krohn, M. J. Freedman, and D. Mazieres, \"On-the-fly verification of rateless erasure codes for efficient content distribution,\" in IEEE Symp. on Security and Privacy, pp. 226--240, 2004, 2004, pp. 226--240."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2094592"},{"key":"e_1_3_2_1_9_1","first-page":"4036","article-title":"A survey of Mobile ad hoc network attacks","volume":"2","author":"Jawandhiya P.","year":"2010","unstructured":"P. Jawandhiya , M. Ghonge , M. S. Ali , and J. S. Deshpande , \" A survey of Mobile ad hoc network attacks ,\" Internationnal Journal of Engineering science and Technology , vol. 2 , pp. 4036 -- 4071 , 2010 . P. Jawandhiya, M. Ghonge, M. S. Ali, and J. S. Deshpande, \"A survey of Mobile ad hoc network attacks,\" Internationnal Journal of Engineering science and Technology, vol. 2, pp. 4036--4071, 2010.","journal-title":"Internationnal Journal of Engineering science and Technology"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111202"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.07.012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.07.010"}],"event":{"name":"MSWiM '13: 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Barcelona Spain","acronym":"MSWiM '13"},"container-title":["Proceedings of the 2nd ACM workshop on High performance mobile opportunistic systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507908.2507915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2507908.2507915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:29Z","timestamp":1750231709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2507908.2507915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":12,"alternative-id":["10.1145\/2507908.2507915","10.1145\/2507908"],"URL":"https:\/\/doi.org\/10.1145\/2507908.2507915","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}