{"id":"https://openalex.org/W2103880438","doi":"https://doi.org/10.1109/wowmom.2009.5282445","title":"Privacy in context-based and epidemic forwarding","display_name":"Privacy in context-based and epidemic forwarding","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2103880438","doi":"https://doi.org/10.1109/wowmom.2009.5282445","mag":"2103880438"},"language":"en","primary_location":{"id":"doi:10.1109/wowmom.2009.5282445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2009.5282445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks &amp; Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030199092","display_name":"Abdullatif Shikfa","orcid":"https://orcid.org/0000-0002-6479-3578"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Abdullatif Shikfa","raw_affiliation_strings":["Eurecom Institute, France","EURECOM - France"],"affiliations":[{"raw_affiliation_string":"Eurecom Institute, France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"EURECOM - France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033286104","display_name":"Melek \u00d6nen","orcid":"https://orcid.org/0000-0003-0269-9495"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Melek Onen","raw_affiliation_strings":["Eurecom Institute, France","EURECOM - France"],"affiliations":[{"raw_affiliation_string":"Eurecom Institute, France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"EURECOM - France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006267397","display_name":"Refik Molva","orcid":"https://orcid.org/0000-0001-5947-5850"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Refik Molva","raw_affiliation_strings":["Eurecom Institute, France","EURECOM - France"],"affiliations":[{"raw_affiliation_string":"Eurecom Institute, France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"EURECOM - France","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030199092"],"corresponding_institution_ids":["https://openalex.org/I1902872"],"apc_list":null,"apc_paid":null,"fwci":1.7142,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.85496283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8484262228012085},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7333680987358093},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5890710353851318},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5408632159233093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5364232063293457},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.46608966588974},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4572067856788635},{"id":"https://openalex.org/keywords/dissemination","display_name":"Dissemination","score":0.4522642493247986},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.448237806558609},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44442230463027954},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4440225064754486},{"id":"https://openalex.org/keywords/virtual-routing-and-forwarding","display_name":"Virtual routing and forwarding","score":0.4422647953033447},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3260144591331482},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.29745280742645264},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.22524431347846985},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.14681467413902283},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0730704665184021}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8484262228012085},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7333680987358093},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5890710353851318},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5408632159233093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5364232063293457},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.46608966588974},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4572067856788635},{"id":"https://openalex.org/C101780184","wikidata":"https://www.wikidata.org/wiki/Q840576","display_name":"Dissemination","level":2,"score":0.4522642493247986},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.448237806558609},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44442230463027954},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4440225064754486},{"id":"https://openalex.org/C157626507","wikidata":"https://www.wikidata.org/wiki/Q7935037","display_name":"Virtual routing and forwarding","level":5,"score":0.4422647953033447},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3260144591331482},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.29745280742645264},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.22524431347846985},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.14681467413902283},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0730704665184021},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wowmom.2009.5282445","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2009.5282445","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks &amp; Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","score":0.800000011920929,"id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W8087261","https://openalex.org/W1488540163","https://openalex.org/W1504320512","https://openalex.org/W1549671385","https://openalex.org/W1966518282","https://openalex.org/W1970093861","https://openalex.org/W1972215683","https://openalex.org/W1996360405","https://openalex.org/W2031950611","https://openalex.org/W2039157284","https://openalex.org/W2054534800","https://openalex.org/W2118430527","https://openalex.org/W2122744359","https://openalex.org/W2125957038","https://openalex.org/W2142522527","https://openalex.org/W2145912839","https://openalex.org/W2152924492","https://openalex.org/W2161214567","https://openalex.org/W2161323294","https://openalex.org/W3162914541","https://openalex.org/W4232836212","https://openalex.org/W6629337237","https://openalex.org/W6632662727","https://openalex.org/W6671828919","https://openalex.org/W6683799570"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W1535080110"],"abstract_inverted_index":{"Autonomic":[0],"and":[1,75,104,123],"opportunistic":[2],"communications":[3],"require":[4],"specific":[5],"routing":[6],"algorithms,":[7],"like":[8],"replication-based":[9],"algorithms":[10],"or":[11],"context-based":[12,39],"forwarding.":[13],"Privacy":[14],"is":[15],"a":[16,54,92],"major":[17],"concern":[18],"for":[19],"protocols":[20],"which":[21,50,88],"disseminate":[22],"the":[23,34,42,58,64,71,76,121,128],"context":[24,52],"of":[25,44,60,98,127],"their":[26],"destination.":[27],"In":[28],"this":[29],"paper,":[30],"we":[31],"focus":[32],"on":[33,95],"privacy":[35,66,80,114],"issue":[36],"inherent":[37],"to":[38,56,70,91],"protocols,":[40],"in":[41,81,120],"framework":[43],"an":[45,83],"original":[46],"epidemic":[47],"forwarding":[48,111],"scheme,":[49],"uses":[51],"as":[53],"heuristic":[55],"limit":[57],"replication":[59],"messages.":[61],"We":[62],"define":[63],"achievable":[65],"level":[67],"with":[68],"respect":[69],"trusted":[72],"communities":[73],"assumption,":[74],"security":[77],"implications.":[78],"Indeed,":[79],"such":[82],"environment":[84],"raises":[85],"challenging":[86],"problems,":[87],"lead":[89],"us":[90],"solution":[93,109],"based":[94],"two":[96],"refinements":[97],"identity-based":[99],"encryption,":[100],"namely":[101],"searchable":[102],"encryption":[103],"policy-based":[105],"encryption.":[106],"This":[107],"new":[108],"enables":[110],"while":[112],"preserving":[113],"by":[115,124],"allowing":[116],"secure":[117],"partial":[118],"matches":[119],"header":[122],"enforcing":[125],"confidentiality":[126],"payload.":[129]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
