{"id":"https://openalex.org/W1991706615","doi":"https://doi.org/10.1145/2508859.2516715","title":"PCTCP","display_name":"PCTCP","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W1991706615","doi":"https://doi.org/10.1145/2508859.2516715","mag":"1991706615"},"language":"en","primary_location":{"id":"doi:10.1145/2508859.2516715","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2508859.2516715","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM SIGSAC conference on Computer &amp; communications security - CCS '13","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089748259","display_name":"Mashael AlSabah","orcid":"https://orcid.org/0000-0001-6764-8280"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Mashael AlSabah","raw_affiliation_strings":["Qatar Computing Research Institute & Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Qatar Computing Research Institute & Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090953912","display_name":"Ian Goldberg","orcid":"https://orcid.org/0000-0002-1176-2882"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ian Goldberg","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada","University of Waterloo Waterloo ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"University of Waterloo Waterloo ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089748259"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":null,"apc_paid":null,"fwci":7.2135,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.96769532,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"349","last_page":"360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7930413484573364},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7348190546035767},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.6363928318023682},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6272234320640564},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.5872003436088562},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.5625132918357849},{"id":"https://openalex.org/keywords/transport-layer","display_name":"Transport layer","score":0.5605517029762268},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4765634834766388},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.4547819197177887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4530184268951416},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4445357918739319},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.43250831961631775},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20342150330543518},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16562488675117493},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.11632147431373596},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1122160255908966},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08617201447486877}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7930413484573364},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7348190546035767},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.6363928318023682},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6272234320640564},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.5872003436088562},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.5625132918357849},{"id":"https://openalex.org/C7345512","wikidata":"https://www.wikidata.org/wiki/Q209372","display_name":"Transport layer","level":3,"score":0.5605517029762268},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4765634834766388},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.4547819197177887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4530184268951416},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4445357918739319},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.43250831961631775},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20342150330543518},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16562488675117493},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.11632147431373596},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1122160255908966},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08617201447486877},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2508859.2516715","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2508859.2516715","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM SIGSAC conference on Computer &amp; communications security - CCS '13","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W126203942","https://openalex.org/W268795945","https://openalex.org/W1481202711","https://openalex.org/W1545050218","https://openalex.org/W1564286957","https://openalex.org/W1594777977","https://openalex.org/W1655958391","https://openalex.org/W1769920533","https://openalex.org/W1779054061","https://openalex.org/W1810963314","https://openalex.org/W1841583684","https://openalex.org/W1992562179","https://openalex.org/W2031300462","https://openalex.org/W2035508649","https://openalex.org/W2045949885","https://openalex.org/W2072534134","https://openalex.org/W2081307968","https://openalex.org/W2104599106","https://openalex.org/W2118451355","https://openalex.org/W2119614634","https://openalex.org/W2124478678","https://openalex.org/W2125530623","https://openalex.org/W2138670865","https://openalex.org/W2144386326","https://openalex.org/W2147745629","https://openalex.org/W2149143215","https://openalex.org/W2167200286","https://openalex.org/W2189469435","https://openalex.org/W2221045997","https://openalex.org/W2235280939","https://openalex.org/W2243167037"],"related_works":["https://openalex.org/W1853064034","https://openalex.org/W1892257551","https://openalex.org/W2497803134","https://openalex.org/W2158090805","https://openalex.org/W2371256782","https://openalex.org/W2996688537","https://openalex.org/W2108112075","https://openalex.org/W2254132456","https://openalex.org/W4362544950","https://openalex.org/W3201435762"],"abstract_inverted_index":{"Recently,":[0],"there":[1],"have":[2],"been":[3],"several":[4,38],"research":[5],"efforts":[6],"to":[7],"design":[8,52],"a":[9,47,73],"transport":[10,51],"layer":[11,86],"that":[12,33,56,78],"meets":[13],"the":[14,22,58,61,83],"security":[15,85],"requirements":[16],"of":[17,60],"anonymous":[18,49],"communications":[19],"while":[20],"maximizing":[21],"network":[23],"performance":[24,39],"experienced":[25],"by":[26,81],"users.":[27],"In":[28,64],"this":[29],"work,":[30],"we":[31,44],"argue":[32],"existing":[34],"proposals":[35],"suffer":[36],"from":[37],"and":[40,43],"deployment":[41],"issues":[42],"introduce":[45],"PCTCP,":[46,65],"novel":[48],"communication":[50],"for":[53,87],"overlay":[54,67],"networks":[55],"addresses":[57],"shortcomings":[59],"previous":[62],"proposals.":[63],"every":[66],"path,":[68],"or":[69],"circuit,":[70],"is":[71,79],"assigned":[72],"separate":[74],"kernel-level":[75],"TCP":[76],"connection":[77],"protected":[80],"IPsec,":[82],"standard":[84],"IP.":[88]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
