{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T19:53:32Z","timestamp":1723233212245},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.23919\/ifipnetworking.2017.8264835","type":"proceedings-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T22:40:12Z","timestamp":1516660812000},"source":"Crossref","is-referenced-by-count":11,"title":["PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks"],"prefix":"10.23919","author":[{"given":"Naercio","family":"Magaia","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Borrego","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/2331838"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.11.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.10.002"},{"key":"ref12","article-title":"On data banks and privacy homomorphims","author":"rivest","year":"1978","journal-title":"Found Secur"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2013.6707798"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.11.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288113"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263749"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/b19290-22"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.246"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.002"},{"key":"ref29","year":"2014","journal-title":"Algorithms key size and parameters report-2014"},{"key":"ref5","first-page":"37","article-title":"a Survey of Algorithms for Privacy-Preservation of Graphs and Social Networks","author":"wu","year":"2009","journal-title":"Manag Min Graph Data"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214283"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.035"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00103"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2348616.2348635"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041911.00093"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462135"},{"key":"ref22","author":"kurose","year":"2012","journal-title":"Computer Networking A Top-down Approach"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref24","article-title":"CRAWDAD dataset roma\/taxi (v.2014&#x2013;07-17)","author":"bracciale","year":"2014","journal-title":"CRAWDAD Wireless Network Data Archive"},{"key":"ref23","author":"akestoridis","year":"2016","journal-title":"CRAWDAD dataset uoi\/haggle (v 2016&#x2013;08-28) derived from cambridge\/haggle (v 2009-05-29)"},{"key":"ref26","first-page":"239","author":"lindgren","year":"2004","journal-title":"Probabilistic Routing in Intermittently Connected Networks"},{"key":"ref25","article-title":"Epidemic routing for partially connected ad hoc networks","author":"vahdat","year":"2000","journal-title":"Technical Report CS-200006 Duke University"}],"event":{"name":"2017 IFIP Networking Conference (IFIP Networking) and Workshops","location":"Stockholm, Sweden","start":{"date-parts":[[2017,6,12]]},"end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253906\/8264823\/08264835.pdf?arnumber=8264835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T02:42:47Z","timestamp":1518057767000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8264835\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2017.8264835","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}