{"id":"https://openalex.org/W2606583336","doi":"https://doi.org/10.1109/icin.2017.7899431","title":"Tell me again, why should i talk to strangers?","display_name":"Tell me again, why should i talk to strangers?","publication_year":2017,"publication_date":"2017-03-01","ids":{"openalex":"https://openalex.org/W2606583336","doi":"https://doi.org/10.1109/icin.2017.7899431","mag":"2606583336"},"language":"en","primary_location":{"id":"doi:10.1109/icin.2017.7899431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin.2017.7899431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089866890","display_name":"Jean\u2010Charles Gr\u00e9goire","orcid":"https://orcid.org/0000-0002-1107-0202"},"institutions":[{"id":"https://openalex.org/I39481719","display_name":"Institut National de la Recherche Scientifique","ror":"https://ror.org/04td37d32","country_code":"CA","type":"education","lineage":["https://openalex.org/I39481719","https://openalex.org/I49663120"]},{"id":"https://openalex.org/I2801596155","display_name":"Montfort Hospital","ror":"https://ror.org/02crzj551","country_code":"CA","type":"healthcare","lineage":["https://openalex.org/I2801596155"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jean-Charles Gr\u00e9goire","raw_affiliation_strings":["INRS-EMT, Montr&#x00E9;al, Canada","INRS-EMT, Montr\u00e9al, Canada"],"affiliations":[{"raw_affiliation_string":"INRS-EMT, Montr&#x00E9;al, Canada","institution_ids":["https://openalex.org/I2801596155","https://openalex.org/I39481719"]},{"raw_affiliation_string":"INRS-EMT, Montr\u00e9al, Canada","institution_ids":["https://openalex.org/I39481719"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043508969","display_name":"Song Nhi Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210107346","display_name":"Montrose Center","ror":"https://ror.org/01d9afc73","country_code":"US","type":"other","lineage":["https://openalex.org/I4210107346"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Song Nhi Nguyen","raw_affiliation_strings":["Ville de Montral, Montr&#x00E9;al, Canada","Ville de Montral, Montr\u00e9al, Canada"],"affiliations":[{"raw_affiliation_string":"Ville de Montral, Montr&#x00E9;al, Canada","institution_ids":["https://openalex.org/I4210107346"]},{"raw_affiliation_string":"Ville de Montral, Montr\u00e9al, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089866890"],"corresponding_institution_ids":["https://openalex.org/I2801596155","https://openalex.org/I39481719"],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53511868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"316","last_page":"318"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.8256955742835999},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8128716945648193},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7785506844520569},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7407650351524353},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5913404822349548},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5643240213394165},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.5112531185150146},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5100058317184448},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44842132925987244},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3242855668067932},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18699505925178528}],"concepts":[{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.8256955742835999},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8128716945648193},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7785506844520569},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7407650351524353},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5913404822349548},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5643240213394165},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.5112531185150146},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5100058317184448},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44842132925987244},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3242855668067932},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18699505925178528},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icin.2017.7899431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin.2017.7899431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W91206318","https://openalex.org/W1572499759","https://openalex.org/W2018501701","https://openalex.org/W2040943688","https://openalex.org/W2105975290","https://openalex.org/W2111619626","https://openalex.org/W2153925581","https://openalex.org/W2163413582","https://openalex.org/W2289424780","https://openalex.org/W6634384834"],"related_works":["https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W4387918499","https://openalex.org/W2368710903","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2786267942","https://openalex.org/W2769254131","https://openalex.org/W2091556092"],"abstract_inverted_index":{"In":[0,77,98],"the":[1,104,107,110,152],"Internet":[2],"of":[3,29,33,71,106,113,131],"Things,":[4],"it":[5,53],"is":[6,36,54,143],"not":[7,38],"straightforward":[8],"to":[9,40,56,67],"decide":[10],"which":[11,85],"devices":[12,24,86],"can":[13,87],"interact,":[14],"or":[15],"how.":[16],"Under":[17],"a":[18,26,43,69,126,140],"unique":[19],"label":[20],"we":[21,80,101,136],"are":[22,61],"hiding":[23],"with":[25],"large":[27],"variety":[28,70],"capabilities":[30],"and":[31,64,75,89,96,109,116,146],"means":[32],"communications.":[34],"It":[35],"therefore":[37],"realistic":[39],"assume":[41],"that":[42,59,139],"single":[44],"security":[45,149],"framework":[46],"will":[47],"suffice":[48],"for":[49],"all":[50],"cases.":[51],"Yet,":[52],"critical":[55],"make":[57],"sure":[58],"communications":[60,108],"properly":[62],"authorized,":[63],"possibly":[65],"secured,":[66],"avoid":[68],"issues":[72,112,150],"including":[73],"hijacking":[74],"eavesdropping.":[76],"this":[78],"paper,":[79],"identify":[81],"different":[82],"perspectives":[83],"under":[84],"communicate":[88],"their":[90],"specific":[91],"requirements,":[92],"as":[93],"embedded,":[94],"peered":[95],"independent.":[97],"each":[99],"case,":[100],"look":[102],"at":[103,121],"nature":[105],"key":[111],"identification,":[114],"authorization,":[115],"protection.":[117],"Rather":[118],"than":[119,155],"looking":[120],"those":[122],"classical":[123],"problems":[124],"from":[125],"device":[127],"perspective":[128,142],"on":[129],"top":[130],"an":[132,156],"open,":[133],"end-to-end":[134],"network,":[135],"propose":[137],"instead":[138],"platform":[141],"more":[144],"beneficial,":[145],"help":[147],"integrate":[148],"into":[151],"design,":[153],"rather":[154],"afterthought.":[157]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
