{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:15:40Z","timestamp":1743084940810,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319325569"},{"type":"electronic","value":"9783319325576"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32557-6_7","type":"book-chapter","created":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T10:17:13Z","timestamp":1468923433000},"page":"73-81","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Anonymous Communication Technology in MANET"],"prefix":"10.1007","author":[{"given":"Weidong","family":"Fang","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhidong","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Fengrong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lianhai","family":"Shan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,20]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Yuan, J., Lu, J.F.: The research and application of terminal using in vehicle network. In: Proceeding IEEE ICEIEC, Beijing, China, pp. 305\u2013308 (2013)","DOI":"10.1109\/ICEIEC.2013.6835512"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Sood, M., Kanwar, S.: Clustering in MANET and VANET: a survey. In: Proceeding CSCITA, Mumbai, Maharashtra, India, pp. 375\u2013380 (2014)","DOI":"10.1109\/CSCITA.2014.6839290"},{"key":"7_CR3","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/SURV.2009.090205","volume":"11","author":"X Chen","year":"2009","unstructured":"Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tut. 11, 52\u201373 (2009)","journal-title":"IEEE Commun. Surv. Tut."},{"key":"7_CR4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-540-24660-2_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"P Golle","year":"2004","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163\u2013178. Springer, Heidelberg (2004)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-31815-6_32","volume-title":"Information Security Applications","author":"M Gomu\u0142kiewicz","year":"2005","unstructured":"Gomu\u0142kiewicz, M., Klonowski, M., Kuty\u0142owski, M.: Onions based on universal re-encryption \u2013 anonymous communication immune against repetitive attack. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 400\u2013410. Springer, Heidelberg (2005)"},{"key":"7_CR7","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42, 39\u201341 (1999)","journal-title":"Commun. ACM"},{"key":"7_CR8","first-page":"463","volume":"24","author":"FX Zhao","year":"2001","unstructured":"Zhao, F.X., Wang, Y.M., Wang, C.J.: An authenticated scheme of onion routing. Chin. J. Comput. 24, 463\u2013467 (2001)","journal-title":"Chin. J. Comput."},{"key":"7_CR9","first-page":"88","volume":"34","author":"LH Li","year":"2013","unstructured":"Li, L.H., Fu, S.F., Su, R.D., Che, X.Q.: Cryptanalysis of a hybrid-structured onion routing scheme. J. Commun. 34, 88\u201398 (2013)","journal-title":"J. Commun."},{"key":"7_CR10","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"MK Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 66\u201392 (1998)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR11","first-page":"109","volume":"20","author":"T Tao","year":"2008","unstructured":"Tao, T., Bao, R.D., Sun, L.C.: Research on performance of S-crowds anonymous communication protocol. J. Naval Univ. Eng. 20, 109\u2013112 (2008)","journal-title":"J. Naval Univ. Eng."},{"key":"7_CR12","first-page":"88","volume":"33","author":"YX Wu","year":"2008","unstructured":"Wu, Y.X., Huang, M.H., Wang, H.: An improved anonymous communication system based on crowds. Jiangxi Norm. Univ. (Natural Science) 33, 88\u201391 (2008)","journal-title":"Jiangxi Norm. Univ. (Natural Science)"},{"key":"7_CR13","unstructured":"M\u00f6ller, U,, Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol - version 2. Draft (2003). http:\/\/www.freehaven.net\/anonbib"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: Proceeding WPES, Washington, DC, USA, pp. 91\u2013102 (2002)","DOI":"10.1145\/644527.644537"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceeding ACM CCS, Washington, DC, USA, pp. 193\u2013206 (2002)","DOI":"10.1145\/586110.586137"},{"key":"7_CR16","unstructured":"Dai, W.: PipeNet 1.1. (1996). http:\/\/www.eskimo.com\/~weidai\/pipenet.txt"},{"key":"7_CR17","unstructured":"https:\/\/geti2p.net"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Kong, J., Hong, X.: ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proceeding ACM MOBIHOC, Annapolis, Maryland, USA, pp. 291\u2013302 (2003)","DOI":"10.1145\/778415.778449"},{"key":"7_CR19","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1504\/IJWMC.2009.028896","volume":"3","author":"S Seys","year":"2009","unstructured":"Seys, S., Preneel, B.: ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wireless Mob. Comput. 3, 145\u2013155 (2009)","journal-title":"Int. J. Wireless Mob. Comput."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Pan, J., Li, J.: MASR: an efficient strong anonymous routing protocol for mobile ad hoc networks. In: Proceeding IEEE MASS, Beijing, China, pp. 1\u20136 (2009)","DOI":"10.1109\/ICMSS.2009.5301090"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Jiang, R., Xing, Y.: Anonymous on-demand routing and secure checking of traffic forwarding for mobile ad hoc networks. In: Proceeding IEEE SRDS, Irvine, California, USA, pp. 406\u2013411 (2012)","DOI":"10.1109\/SRDS.2012.6"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Li, T., Feng, Y., Wang, F., Fu, X.D.: A dynamic pseudonyms based anonymous routing protocol for wireless ad hoc networks. In: Proceeding IEEE MSN, Chengdu, China, pp. 82\u201386 (2012)","DOI":"10.1109\/MSN.2012.13"},{"key":"7_CR23","unstructured":"Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile ad hoc networks. In: Proceeding IEEE INFOCOM, Miami, Florida, USA, pp. 1940\u20131951 (2005)"},{"key":"7_CR24","unstructured":"Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: Anonymous secure routing in mobile ad-hoc networks. In: Proceeding IEEE LCN, Tampa, Florida, USA, pp. 102\u2013108 (2004)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Kalai Selvi, S., Ganeshkumar, V.: EARP: energy-aware anonymous routing protocol in MANETs. In: Proceeding ICACCCT, Ramanathapuram, India, pp. 1143\u20131147 (2014)","DOI":"10.1109\/ICACCCT.2014.7019276"},{"key":"7_CR26","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1109\/TVT.2014.2313180","volume":"63","author":"W Liu","year":"2014","unstructured":"Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63, 4585\u20134593 (2014)","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32557-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T14:43:54Z","timestamp":1498315434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32557-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319325569","9783319325576"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32557-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}