{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:39:53Z","timestamp":1742917193020,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_10","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T10:07:57Z","timestamp":1548324477000},"page":"132-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Workload Distribution for Supporting Anonymous Communications in Automotive Network"],"prefix":"10.1007","author":[{"given":"Mehran Alidoost","family":"Nia","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Ruiz-Mart\u00ednez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"10_CR1","unstructured":"National Vulnerability Database, \u201cCVSS Severity Distribution Over Time,\u201d Annual report of NIST, Last updated January 2016"},{"key":"10_CR2","unstructured":"Nisch, P.: Security Issues in Modern Automotive Systems (2012). http:\/\/www.panisch.com"},{"key":"10_CR3","unstructured":"Koscher, K.: Securing embedded systems: analyses of modern automotive systems and enabling near-real time dynamic analysis. Doctor of Philosophy Thesis, University of Washington (2014)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, N.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Nia, M.A., Babulak, E., Fabian, B., Atani, R.E.: An analytical perspective to traffic engineering in anonymous communication systems. In: Progress in Computer Sciences and Information Technology International Conference, Malaysia, pp. 1\u20136 (2016)","DOI":"10.2139\/ssrn.3923803"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Nia, M.A., Atani, R.E., Haghi, A.K.: Ubiquitous IoT structure via homogeneous data type modelling. In: 7th International Symposium on Telecommunications (IST), Tehran (2014)","DOI":"10.1109\/ISTEL.2014.7000715"},{"issue":"16","key":"10_CR7","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.1002\/sec.1219","volume":"8","author":"MA Nia","year":"2015","unstructured":"Nia, M.A., Atani, R.E., Ruiz-Mart\u00ednez, A.: Privacy enhancement in anonymous network channels using multimodality injection. Security Comm. Networks 8(16), 2917\u20132932 (2015)","journal-title":"Security Comm. Networks"},{"key":"10_CR8","unstructured":"Bosch, \u201cCAN Specification version 2.0\u201d, Robert Bosch GmbH, Postfach 30 02 40, D-70442, Stuttgart (1991)"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.cose.2015.02.004","volume":"52","author":"K Fuchs","year":"2015","unstructured":"Fuchs, K., Herrmann, D., Federrath, H.: Workload modelling for mix-based anonymity services. Comput. Secur. 52, 221\u2013233 (2015)","journal-title":"Comput. Secur."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Khan, D.A., Davis, R.I., Navet, N.: Schedulability Analysis of CAN with non-abortable transmission requests. In: Proceedings 16th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2011), 5\u20139 September (2011)","DOI":"10.1109\/ETFA.2011.6058998"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: Proceeding of IEEE Symposium on Security and Privacy, May 2010","DOI":"10.1109\/SP.2010.34"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Meumeu-Yomsi, P., Bertrand, D., Navet, N., Davis, R.: Controller Area Network (CAN): response time analysis with offsets. In: Proceedings of the 9th IEEE International Workshop on Factory Communication System, Germany (2012)","DOI":"10.1109\/WFCS.2012.6242539"},{"key":"10_CR13","first-page":"497","volume":"69","author":"MA Nia","year":"2017","unstructured":"Nia, M.A., Ruiz-Mart\u00ednez, A.: Systematic literature review on the state of the art and future research work in anonymous communications systems. Comput. Electr. Eng. 69, 497\u2013520 (2017)","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1016\/j.jnca.2012.02.011","volume":"35","author":"A Ruiz-Mart\u00ednez","year":"2012","unstructured":"Ruiz-Mart\u00ednez, A.: A survey on solutions and main free tools for privacy enhancing Web communications. J. Network Comput. Appl. 35(5), 1473\u20131492 (2012)","journal-title":"J. Network Comput. Appl."},{"issue":"2","key":"10_CR15","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/SURV.2011.042011.00080","volume":"14","author":"D Kelly","year":"2012","unstructured":"Kelly, D., Raines, R., Baldwin, R., Grimaila, M., Mullins, B.: Exploring extant and emerging issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE Commun. Surv. Tutorials 14(2), 579\u2013606 (2012)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2015.7081076","volume":"53","author":"M Yang","year":"2015","unstructured":"Yang, M., Luo, J., Ling, Z., Fu, X., Yu, W.: De-anonymizing and countermeasures in anonymous communication networks. IEEE Comm. Magazine 53(4), 60\u201366 (2015)","journal-title":"IEEE Comm. Magazine"},{"issue":"12","key":"10_CR17","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1016\/j.comcom.2013.04.009","volume":"36","author":"B Li","year":"2013","unstructured":"Li, B., Erdin, E., Gunes, M.H., Bebis, G., Shipley, T.: An overview of anonymity technology usage. Comput. Commun. 36(12), 1269\u20131283 (2013)","journal-title":"Comput. Commun."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"David M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Information Hiding, pp. 137\u2013150 (1996)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Improving efficiency and simplicity of tor circuit establishment and hidden services. In: Privacy Enhancing Technologies, pp. 134\u2013152 (2007)","DOI":"10.1007\/978-3-540-75551-7_9"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Al-kahtani, M.S.: Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In: 6th International Conference on Signal Processing and Communication Systems (2012)","DOI":"10.1109\/ICSPCS.2012.6507953"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Mejri, M.N., Hamdi, M.: Recent advances in cryptographic solutions for vehicular networks. In: 2015 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20137 (2015)","DOI":"10.1109\/ISNCC.2015.7238573"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T21:42:58Z","timestamp":1662846178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}