{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:45:13Z","timestamp":1743018313769,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770473"},{"type":"electronic","value":"9783540770480"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77048-0_14","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T10:10:22Z","timestamp":1195207822000},"page":"177-188","source":"Crossref","is-referenced-by-count":2,"title":["On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme"],"prefix":"10.1007","author":[{"given":"Qianli","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"DragonLab, \n                    \n                      http:\/\/www.dragonlab.org\/"},{"issue":"5","key":"14_CR2","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/35.841836","volume":"38","author":"T. McGregor","year":"2000","unstructured":"McGregor, T., Braun, H., Brown, J.: The NLANR network analysis infrastructure. IEEE Communications Magazine\u00a038(5), 122\u2013128 (2000)","journal-title":"IEEE Communications Magazine"},{"key":"14_CR3","unstructured":"The Internet traffic archive (April 2000), \n                    \n                      http:\/\/ita.ee.lbl.gov\/"},{"key":"14_CR4","unstructured":"Patarin, S., Makpangou, M., Pandora, M.: A flexible network monitoring platform. In: Proceedings of the 2000 USENIX Annual Technical Conference (June 2000)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Peuhkuri, M.: A Method to Compress and Anonymize Packet Traces. SIGCOMM IMW\u00a0 (2001)","DOI":"10.1145\/505202.505233"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Pang, R., Paxson, V.: A high-level programming environment for packet trace anonymization and transformation. SIGCOMM (2003)","DOI":"10.1145\/863955.863994"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wang, J.: On network-ware clustering of web clients. In: SIGCOMM (2000)","DOI":"10.1145\/347059.347412"},{"key":"14_CR8","unstructured":"Minshall, G.: TCPdpriv Command Manual (1996)"},{"key":"14_CR9","unstructured":"Cho, K., Mitsuya, K., Kato, A.: Traffic data repository at the wide project. In: Proceedings of USENIX 2000 Annual Technical Conference: FREENIX Track, San Diego, CA (June 2000)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: On the design and performance of prefix-preserving IP traffic trace anonymization. In: SIGCOMM IMW (2001)","DOI":"10.1145\/505202.505234"},{"key":"14_CR11","unstructured":"Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: Prefix-preserving IP address anonymization: measurement based security evaluation and a new cryptography-based scheme. In: ICNP (2002)"},{"key":"14_CR12","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael, Tech. Rep., Computer Security Resource Center, National Institute of Standards and Technology (February 2001), \n                    \n                      http:\/\/csrc.nist.gov\/encryption\/aes\/rijndael\/Rijndael.pdf"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Beyls, K., D\u2019Hollander, E.: Reuse distance-based cache hint selection. In: Proccedings of the 8th International Euro-Par Conference (August 2002)","DOI":"10.1007\/3-540-45706-2_35"},{"key":"14_CR14","unstructured":"Jenkins, B.: ISAAC: a fast cryptographic random number generator, \n                    \n                      http:\/\/burtleburtle.net\/bob\/rand\/isaac.html"},{"key":"14_CR15","unstructured":"Pudovkina, M.: A known plaintext attack on the ISAAC keystream generator, \n                    \n                      http:\/\/eprint.iacr.org\/2001\/049.pdf"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: RFC 2104: HMAC: Keyed-Hashing for Message Authentication (February 1997)","DOI":"10.17487\/rfc2104"},{"key":"14_CR17","unstructured":"Ylonen, T.: Thoughts on how to mount an attack on tpcpdriv\u2019s \u201d-50\u201d option, in TCPpdpriv source distribution (1996)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77048-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:04:07Z","timestamp":1566763447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77048-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540770473","9783540770480"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77048-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}