{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:34:49Z","timestamp":1740202489566,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642136009"},{"type":"electronic","value":"9783642136016"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13601-6_8","type":"book-chapter","created":{"date-parts":[[2010,6,3]],"date-time":"2010-06-03T08:59:16Z","timestamp":1275555556000},"page":"65-72","source":"Crossref","is-referenced-by-count":3,"title":["Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection"],"prefix":"10.1007","author":[{"given":"Vakul","family":"Mohanty","sequence":"first","affiliation":[]},{"given":"Dhaval","family":"Moliya","sequence":"additional","affiliation":[]},{"given":"Chittaranjan","family":"Hota","sequence":"additional","affiliation":[]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"8_CR1","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M. Reed","year":"1998","unstructured":"Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and Onion Routing. IEEE J. Selected Areas in Commun.\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE J. Selected Areas in Commun."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Papadimitratos, Haas: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31 (2002)","DOI":"10.1201\/9781420040401.ch31"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 2002 IEEE International Conference on Network Protocols, ICNP (November 2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Zhu, B., Van, Z., et al.: Anonymious secure routing in mobile ad hoc networks. In: 29th IEEE International conference on local computer networks LCN\u201904, pp. 102\u2013108 (2004)","DOI":"10.1109\/LCN.2004.21"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Huang, D.: Traffic analysis-based unlinkability measure for ieee 802.11b-based communication systems. In: Proceedings of ACM Workshop on Wireless Security, WiSe (2006)","DOI":"10.1145\/1161289.1161303"},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.comcom.2009.11.009","volume":"33","author":"J. Ren","year":"2010","unstructured":"Ren, J., Wu, J.: Survey On Anonymous Communications In Computer Networks. Comput. Commun.\u00a033(4), 420\u2013431 (2010)","journal-title":"Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13601-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:08:26Z","timestamp":1740154106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13601-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136009","9783642136016"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13601-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}