{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:18:31Z","timestamp":1742379511172,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_27","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"218-232","source":"Crossref","is-referenced-by-count":6,"title":["WAR: Wireless Anonymous Routing"],"prefix":"10.1007","author":[{"given":"Matt","family":"Blaze","sequence":"first","affiliation":[]},{"given":"John","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"Tal","family":"Malkin","sequence":"additional","affiliation":[]},{"given":"Avi","family":"Rubin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM (CACM)\u00a024, 84\u201388 (1981)","journal-title":"Communications of the ACM (CACM)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proc. of the 10th annu. ACM symp. on Principles of Distributed Computing, pp. 51\u201359 (2001)","DOI":"10.1145\/112600.112605"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/3-540-48658-5_38","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Canetti","year":"1994","unstructured":"Canetti, R., Herzberg, A.: Maintaining security in the presence of transient faults. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 425\u2013438. Springer, Heidelberg (1994)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive public key and signature systems. In: 1997 ACM Conference on Computers and Communication Security (1997)","DOI":"10.1145\/266420.266442"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s00145-002-0128-6","volume":"1","author":"A. Beimel","year":"2003","unstructured":"Beimel, A., Dolev, S.: Buses for anonymous message delivery. J. of Cryptology\u00a01, 25\u201339 (2003)","journal-title":"J. of Cryptology"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Universally Composable Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 337\u2013351. Springer, Heidelberg (2002)"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M. Reed","year":"1998","unstructured":"Reed, M., Syverson, P., Goldschlag, D.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications (JSAC)\u00a016, 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications (JSAC)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks 13 (1999)","DOI":"10.1109\/65.806983"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2002.1039859","volume":"40","author":"H. Deng","year":"2002","unstructured":"Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad Hoc Networks. IEEE Communications\u00a040, 70\u201375 (2002)","journal-title":"IEEE Communications"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), pp. 275\u2013283 (2000)","DOI":"10.1145\/345910.345958"},{"key":"27_CR12","unstructured":"Albers, P., et al.: Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: Proceedings of the 1st International Workshop on Wireless Information Systems, held in conjunction with the 4th International Conference on Enterprise Information Systems (2002)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Marti, S., et al.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"27_CR14","unstructured":"Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th USENIX Security Symposium, pp. 15\u201328 (2003)"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Raymond, J.F.: Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems. In: Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, pp. 10\u201329 (2001)","DOI":"10.1007\/3-540-44702-4_2"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Venkatraman, B.R., Newman-Wolfe, R.E.: Transmission Schedules To Prevent Traffic Analysis. In: Proceedings of the 9th Annual Computer Security and Applications Conference (ACSAC) (1993)","DOI":"10.1109\/CSAC.1993.315448"},{"key":"27_CR17","unstructured":"Venkatraman, B.R., Newman-Wolfe, R.E.: High Level Prevention of Traffic Analysis. In: Proceedings of the 7th Annual Computer Security and Applications Conference (ACSAC) (1991)"},{"key":"27_CR18","unstructured":"Hajek, B., Radosavljevic, B.: Hiding Traffic Flow in Communication Networks. In: Proceedings of the IEEE Military Communication Conference (MilCom) (1992)"},{"key":"27_CR19","unstructured":"Guan, Y., Fu, X., Xuan, D., Shenoy, P., Bettati, R., Zhao, W.: Efficient Traffic Camouflaging in Mission-Critical QoS Guaranteed Networks. IEEE Transactions on Systems, Man, and Cybernetics 31 (2001)"},{"key":"27_CR20","unstructured":"Guan, Y., Li, C., Xuan, D., Bettati, R., Zhao, W.: Preventing Traffic Analysis for Real-Time Communication Networks. In: Proceedings of the IEEE Military Communication Conference (MilCom) (1999)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Gulcu, C., Tsudik, G.: Mixing E-mail with BABEL. In: Symposium on Network and Distributed System Security, pp. 2\u201316 (1996)","DOI":"10.1109\/NDSS.1996.492350"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: Isdn-mixes: Untraceable communication with very small bandwidth overhead. In: GI\/ITG Conference: Communication in Distributed Systems, pp. 451\u2013463 (1991)","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Kung, H.T., Bradner, S., Tan, K.S.: An IP-Layer Anonymizing Infrastructure. In: Proceedings of the IEEE Military Communication Conference (MilCom) (2002)","DOI":"10.1109\/MILCOM.2002.1180473"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Kung, H.T., Cheng, C., Tan, K.S., Bradner, S.: Design and Analysis of an IP-Layer Anonymizing Infrastructure. In: Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX), pp. 62\u201375 (2003)","DOI":"10.1109\/DISCEX.2003.1194873"},{"key":"27_CR25","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private internet connections. Communications of the ACM (CACM)\u00a042, 39\u201341 (1999)","journal-title":"Communications of the ACM (CACM)"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.: Anonymous connections and onion routing. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy (1997)","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Fasbender, A., Kesdogan, D., Kubitz, O.: Variable and Scalable Security: Protection of Location Information in Mobile IP. In: Proceedings of the 46th IEEE Vehicular Technology Society Conference (1996)","DOI":"10.1109\/VETEC.1996.501454"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information System Security 1 (1998)","DOI":"10.1145\/290163.290168"},{"key":"27_CR29","unstructured":"Wright, M., Adler, M., Levine, B., Shields, C.: An analysis of the degradation of anonymity protocols. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2002)"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Wright, M., Adler, M., Levine, B., Shields, C.: Defending anonymous communications against passive logging attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003)","DOI":"10.1109\/SECPRI.2003.1199325"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Felten, E., Schneider, M.: Timing attacks on web privacy. In: 7th ACM Conference on Computer and Communications Security (2000)","DOI":"10.1145\/352600.352606"},{"key":"27_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-45748-8_12","volume-title":"Peer-to-Peer Systems","author":"M.J. Freedman","year":"2002","unstructured":"Freedman, M.J., Sit, E., Cates, J., Morris, R.: Introducing tarzan, a peer-to-peer anonymizing network layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 121. Springer, Heidelberg (2002)"},{"key":"27_CR33","unstructured":"Jiang, S., Vaidya, N.H., Zhao, W.: Dynamic Mix Method in Wireless Ad Hoc Networks. In: Proceedings of the IEEE Military Communication Conference (MilCom) (2001)"},{"key":"27_CR34","unstructured":"Jiang, S., Vaidya, N.H., Zhao, W.: Routing in Packet Radio Networks to Prevent Traffic Analysis. In: Proceedings of the IEEE Information Assurance and Security Workshop (2000)"},{"key":"27_CR35","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MSECP.2003.1253565","volume":"1","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Kesdogan, D.: Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy\u00a01, 27\u201334 (2003)","journal-title":"IEEE Security & Privacy"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:34:00Z","timestamp":1736004840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/11542322_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}