{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:14:08Z","timestamp":1725477248997},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/hicss.2010.219","type":"proceedings-article","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T21:13:22Z","timestamp":1268428402000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity"],"prefix":"10.1109","author":[{"given":"Craig A.","family":"Shue","sequence":"first","affiliation":[]},{"given":"Minaxi","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The IP Network Address Translator (NAT)","year":"1994","author":"egevang","key":"ref10"},{"journal-title":"Inappropriate TCP Resets Considered Harmful","year":"2002","author":"floyd","key":"ref11"},{"journal-title":"Information Science Cornell University","article-title":"Herbivore: A scalable and efficient protocol for anonymous communication","year":"2003","author":"goel","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492350"},{"journal-title":"AOL Breach of privacy was a mistake","year":"2006","author":"jesdanun","key":"ref14"},{"journal-title":"Knowledge Base Article 329928","article-title":"ICF in Windows XP SPI and Windows Server 2003 blocks unsolicited inbound unicast, multicast, and broadcast traffic","year":"0","author":"corporation","key":"ref15"},{"journal-title":"Anonymity Unlinkability Unobservability Pseudonymity and Identity Management - A Consolidated Proposal for Terminology","year":"2008","author":"pfitzmann","key":"ref16"},{"journal-title":"Privoxy - Home Page","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"journal-title":"IEEE Symposium on Research in Security and Privacy","article-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression","year":"1998","author":"samarati","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"journal-title":"RIAA drops file sharing case","year":"2006","author":"bangeman","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"journal-title":"IEEE Symposium on Security and Privacy","article-title":"Miximinion: Design of a type III anonymous remailer protocol","year":"2003","author":"danezis","key":"ref8"},{"journal-title":"Psiphon","year":"0","key":"ref7"},{"journal-title":"Anonymous proxy servers","year":"0","key":"ref2"},{"journal-title":"Can Internet activity ever be truly anonymous?","year":"2008","author":"albanesius","key":"ref1"},{"journal-title":"USENIX Security Symposium","article-title":"Tor: The second generation onion routing","year":"2004","author":"dingledine","key":"ref9"},{"journal-title":"IEEE Symposium on Security and Privacy","article-title":"P5: A protocol for scalable anonymous communication","year":"2002","author":"sherwood","key":"ref20"},{"journal-title":"Tenth USENIX System Administration Conference","article-title":"IP multiplexing by transparent port-address translator","year":"1996","author":"yeom","key":"ref21"}],"event":{"name":"2010 43rd Hawaii International Conference on System Sciences","start":{"date-parts":[[2010,1,5]]},"location":"Honolulu, Hawaii, USA","end":{"date-parts":[[2010,1,8]]}},"container-title":["2010 43rd Hawaii International Conference on System Sciences"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5428222\/5428274\/05428665.pdf?arnumber=5428665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T20:46:09Z","timestamp":1489869969000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5428665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/hicss.2010.219","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}