{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:54Z","timestamp":1748751054646,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_24","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T04:38:40Z","timestamp":1447821520000},"page":"276-289","source":"Crossref","is-referenced-by-count":0,"title":["EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Hongling","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Hong","family":"Song","sequence":"additional","affiliation":[]},{"given":"Weiping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"24_CR1","unstructured":"Zhu, B., Wna, Z., Kankanhalli, M.S., Deng, R.H.: Anonymous secure routing in mobile ad-hoc networks. In: The Proceedings of 29th Annual IEEE International Conference on Local Computer Networks, pp. 102\u2013108. IEEE (2012)"},{"issue":"3","key":"24_CR2","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/wcm.395","volume":"6","author":"X Hong","year":"2012","unstructured":"Hong, X., Kong, J., Gerla, M.: Mobility changes anonymity: new passive threats in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6(3), 281\u2013293 (2012)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"8","key":"24_CR3","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TMC.2007.1021","volume":"6","author":"J Kong","year":"2007","unstructured":"Kong, J., Hong, X., Gerla, M.: An identity-free and on demand routing scheme against anonymity threats in mobile ad-hoc networks. IEEE Trans. Mob. Comput. 6(8), 888\u2013902 (2007)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"2376","DOI":"10.1109\/TWC.2006.1687761","volume":"5","author":"Z Zhang","year":"2006","unstructured":"Zhang, Z., Liu, W., Fang, Y.: MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 5, 2376\u20132385 (2006)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Boukerche, A., El-Khatib, K., Xu, L., et al.: SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In: The Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp: 618\u2013624 (2004)","DOI":"10.1109\/LCN.2004.109"},{"issue":"4","key":"24_CR6","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s11276-010-0319-2","volume":"17","author":"R Zhang","year":"2011","unstructured":"Zhang, R., Zhang, Y., Fang, Y.: AOS: an anonymous overlay system for mobile ad hoc networks. Wirel. Netw. 17(4), 843\u2013859 (2011)","journal-title":"Wirel. Netw."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Zhang. P, Jiang. Y.X., Lin. C.: P-Coding: secure network coding against eavesdropping attacks, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Weiler, N.: Secure anonymous group infrastructure for common and future internet applications. In: The Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, pp. 401\u2013410 (2001)","DOI":"10.1109\/ACSAC.2001.991557"},{"issue":"5","key":"24_CR9","first-page":"754","volume":"32","author":"Y Bao-liu","year":"2004","unstructured":"Bao-liu, Y., Tie-cheng, G., Min-qiang, W., et al.: Mapper: a multicast-based peer-to-peer file anonymous retrieval protocol. Acta Electronica Sinica 32(5), 754\u2013758 (2004)","journal-title":"Acta Electronica Sinica"},{"issue":"3","key":"24_CR10","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.comcom.2010.05.013","volume":"34","author":"LB Oliveira","year":"2010","unstructured":"Oliveira, L.B., Aranha, D.F., Gouva, C.P.L., et al.: TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput. Commun. 34(3), 485\u2013493 (2010)","journal-title":"Comput. Commun."},{"key":"24_CR11","unstructured":"Perng, G., Reiter, M., Wang, C.: M2: multicasting mixes for efficient and anonymous communication. In: The Proceedings of 26th IEEE International Conference on Distributed Computing Systems, pp: 59\u201369 (2006)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Xiao, L., Liu, X., Gu, W., et al.: A design of overlay anonymous multicast protocol. In: The Proceedings of Parallel and Distributed Processing Symposium (IPDPS), pp. 1\u201310 (2006)","DOI":"10.1109\/IPDPS.2006.1639286"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Wang, J., Niu, C., Shen, R.: Bus-based anonymous mulitcast in peer-to-peer overlay. In: The Proceedings of International Conference on Network and Parallel Computing - Workshops, Dalian, China, pp:148\u2013151 (2007)","DOI":"10.1109\/NPC.2007.67"},{"key":"24_CR14","unstructured":"Wright, M., Adler, M., Levine, B., et al.: An analysis of the degradation of anonymous protocols. In: The Proceedings of Network and Distributed System Security Symposium, San Diego, California, pp. 34\u201343 (2002)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:33:38Z","timestamp":1748694818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}