{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:26:44Z","timestamp":1725470804863},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540459071"},{"type":"electronic","value":"9783540459095"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11881223_54","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T11:45:14Z","timestamp":1158925514000},"page":"448-451","source":"Crossref","is-referenced-by-count":0,"title":["Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks"],"prefix":"10.1007","author":[{"given":"Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Huamin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401"},{"key":"54_CR2","unstructured":"Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246"},{"key":"54_CR3","unstructured":"Li, M.: Computer & Security\u00a023, 549\u2013558 (2004); 25, 213\u2013220 (2006)"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Baran, P.: On Distributed Communications: IX Security, Secrecy, and Tamper-Free Considerations. Memo RM-3765-PR, Rand Corp. (1964)","DOI":"10.7249\/RM3765"},{"key":"54_CR5","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Sys. Tech. J.\u00a028, 656\u2013715 (1949)","journal-title":"Bell Sys. Tech. J."},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Han, R., Mishra, S.: Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In: Int. Conf., Dependable Systems and Networks, pp. 594\u2013603 (2004)","DOI":"10.1109\/DSN.2004.1311934"},{"key":"54_CR7","unstructured":"Deng, J., Han, R., Mishra, S.: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks. TR CU-CS-987-04, University of Colorado at Boulder (2004)"},{"key":"54_CR8","unstructured":"Liu, D.X., Chi, C.-H., Li, M.: Normalizing Traffic Pattern with Anonymity for Mission Critical Applications. In: 37th Annu. Simulation Symposium, Virginia, pp. 293\u2013299 (2004)"},{"key":"54_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-59281-2","volume-title":"Chaos: An Introduction to Dynamical Systems","author":"K.T. Alligood","year":"1997","unstructured":"Alligood, K.T., Sauer, T.D., Yorke, J.A.: Chaos: An Introduction to Dynamical Systems. Springer, Heidelberg (1997)"},{"key":"54_CR10","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409"},{"key":"54_CR11","unstructured":"http:\/\/www.acm.org\/sigs\/sigcomm\/ITA\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11881223_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:50:51Z","timestamp":1605624651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11881223_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540459071","9783540459095"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11881223_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}