{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T08:23:09Z","timestamp":1706775789007},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,1,25]],"date-time":"2008-01-25T00:00:00Z","timestamp":1201219200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1007\/s11416-007-0072-y","type":"journal-article","created":{"date-parts":[[2008,1,24]],"date-time":"2008-01-24T14:14:44Z","timestamp":1201184084000},"page":"267-278","source":"Crossref","is-referenced-by-count":11,"title":["Improving security and performance of an Ad Hoc network through a multipath routing strategy"],"prefix":"10.1007","volume":"4","author":[{"given":"Herv\u00e9","family":"Aiache","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois","family":"Haettel","sequence":"additional","affiliation":[]},{"given":"Laure","family":"Lebrun","sequence":"additional","affiliation":[]},{"given":"C\u00e9dric","family":"Tavernier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,1,25]]},"reference":[{"key":"72_CR1","doi-asserted-by":"crossref","unstructured":"Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: SDAR: A secure distributed anonymous routing protocol for wireless and mobile Ad Hoc networks. In: 29th IEEE International Conference on Local Computer Networks (LCN\u201904), pp. 618\u2013624, November 2004","DOI":"10.1109\/LCN.2004.109"},{"key":"72_CR2","doi-asserted-by":"crossref","unstructured":"Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.-C.: Secret handshakes from pairing-based key agreements. In: IEEE Symposium on Security and Privacy, pp. 180\u2013196 (2003)","DOI":"10.1109\/SECPRI.2003.1199336"},{"key":"72_CR3","doi-asserted-by":"crossref","unstructured":"Berthold, O., Federrath, H., Kopsell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (Eds.) DIAU\u201900, Lecture Notes in Computer Science, vol. 2009, pp. 115\u2013129 (2000)","DOI":"10.1007\/3-540-44702-4_7"},{"key":"72_CR4","unstructured":"Bhaskar, R., Augot, D., Issarny, V., Sacchetti, D.: An efficient group key agreement protocol for ad hoc networks. IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing (Affiliated with WoWMoM 2005), Taormina, Italy, 12\u201316 June 2005"},{"issue":"2","key":"72_CR5","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum D.L. (1981). Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM 24(2): 84\u201388","journal-title":"Commun. ACM"},{"key":"72_CR6","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science (2001)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mutaf, P.: Hash-based dynamic source routing. In: IFIP Networking, LNCS, vol. 3042, pp. 101\u2013223 (2004)","DOI":"10.1007\/978-3-540-24693-0_83"},{"key":"72_CR8","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). IETF, Request For Comment 3626, October 2003","DOI":"10.17487\/rfc3626"},{"key":"72_CR9","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24(2), February 1981","DOI":"10.1145\/358549.358563"},{"key":"72_CR10","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of 13th Usenix Security Simposyum, August 2004","DOI":"10.21236\/ADA465464"},{"key":"72_CR11","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: TOR: The second-generation onion router (2004)","DOI":"10.21236\/ADA465464"},{"key":"72_CR12","first-page":"309","volume-title":"Information Hiding LNCS, vol. 3200","author":"C. Diaz","year":"2004","unstructured":"Diaz C. and Preneel B. (2004). Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Fridrich, J. (eds) Information Hiding LNCS, vol. 3200, pp 309\u2013325. Springer, Heidelberg"},{"key":"72_CR13","unstructured":"Daemen, J., Rijmen, V.: The block cipher Rijndael. CARDIS 1998. LNCS, vol. 1820, pp. 247\u2013256 (2000)"},{"key":"72_CR14","doi-asserted-by":"crossref","unstructured":"El-Khatib, K., Korba, L., Song, R., Yee, G.: Secure dynamic distributed routing algorithm for Ad Hoc wireless networks. In: International Conference on Parallel Processing Workshops (ICPPW\u201903) (2003)","DOI":"10.1109\/ICPPW.2003.1240390"},{"key":"72_CR15","unstructured":"Filiol, E.: Computer Viruses: from Theory to Applications. IRIS International Series, Springer, France. ISBN 978-2-287-23939-7 (2005)"},{"key":"72_CR16","unstructured":"Filiol, E.: Techniques Virales Avanc\u00e9es. IRIS International Series, Springer, France. ISBN 978-2-287-33887-8 (2007) (An English translation is pending)"},{"key":"72_CR17","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002) (2002)","DOI":"10.1145\/586110.586137"},{"key":"72_CR18","doi-asserted-by":"crossref","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"V. Guruswami","year":"1999","unstructured":"Guruswami V. and Sudan M. (1999). Improved decoding of Reed\u2013Solomon and algebraic-geometry codes. IEEE Trans. Inform. Theory 45: 1757\u20131767","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"72_CR19","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1137\/S0895480198344540","volume":"13","author":"O. Goldreich","year":"2000","unstructured":"Goldreich O., Rubinfeld R. and Sudan M. (2000). Learning polynomials with queries: the highly noisy case. SIAM J. Discrete Math. 13(4): 535\u2013570","journal-title":"SIAM J. Discrete Math."},{"key":"72_CR20","unstructured":"Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), p. 313, June 2002"},{"key":"72_CR21","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on demand routing protocol for Ad Hoc networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12\u201323 (2002)","DOI":"10.1145\/570645.570648"},{"key":"72_CR22","unstructured":"INET framework for OMNET++. http:\/\/www.omnetpp.org\/doc\/INET\/neddoc\/index.html ."},{"key":"72_CR23","unstructured":"Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The dynamic source routing protocol for mobile Ad Hoc networks (DSR). draft-ietf-manet-dsr-09.txt, April 2003"},{"key":"72_CR24","unstructured":"Jerichow, A.: Generalisation and security improvement of mixed-mediated anonymous communications. Ph.D. Thesis, Technischen Universitat Dresden (2000)"},{"key":"72_CR25","unstructured":"Jean-Marc, P.B.J.: D\u00e9tection d\u2019intrusions dans les r\u00e9seaux Ad Hoc. SSTIC\u201903, 1er Symposium sur la S\u00e9curit\u00e9 des Technologies de l\u2019Information et de la Communication. Rennes, juin (2003)"},{"key":"72_CR26","unstructured":"Kong, J., Hong, X., Gerla, M., Sanadidi, M.Y.: Comparison: ASR is a variant of ANODR. Technical report, UCLA (2005)"},{"key":"72_CR27","doi-asserted-by":"crossref","unstructured":"Kong, J., Hong, X.: ANODR: ANonymous On demand routing with untraceable routes for mobile ad hoc networks. In: ACM MOBIHOC\u201903, pp. 291\u2013302 (2003)","DOI":"10.1145\/778445.778449"},{"key":"72_CR28","doi-asserted-by":"crossref","unstructured":"Kong, J., Hong, X., Gerla, M.: An anonymous on demand routing with untraceable routes for mobile Ad Hoc networks. Technical report CSD-TR030020, Department of Computer Science, UCLA (2003)","DOI":"10.1145\/778445.778449"},{"key":"72_CR29","unstructured":"Kong, J.: Anonymous and untraceable communications in mobilewireless networks. Ph.D. Thesis, University of California, Los Angeles, June 2004"},{"key":"72_CR30","doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Egner, J., Buschkes, R.: Stop-and-go MIXes providing probabilistic security in an open system. Second International Workshop on Information Hiding (IH\u201998), Lecture Notes in Computer Science, vol. 1525, pp. 83\u201398 (1998)","DOI":"10.1007\/3-540-49380-8_7"},{"key":"72_CR31","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz N. (1987). Elliptic curve cryptosystems. Math. Comput. 48: 203\u2013209","journal-title":"Math. Comput."},{"key":"72_CR32","doi-asserted-by":"crossref","unstructured":"Luh, W., Kundur, D.: Distributed privacy for visual sensor networks via markov shares. In: Proceedings of 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems. Columbia, MD, April 2006","DOI":"10.1109\/DSSNS.2006.5"},{"key":"72_CR33","unstructured":"Lou, W., Liu, W., Fang, Y.: SPREAD: Improving network security by multipath routing. IEEE Milcom\u201903. Boston, MA, October 2003"},{"key":"72_CR34","unstructured":"Lou, W., Liu, W., Fang, Y.: SPREAD: enhancing data confidentiality in mobile ad hoc networks. In: The 23rd Conference of the IEEE Communications Society (IEEE Infocom 2004), Hong-Kong, March 2004"},{"key":"72_CR35","unstructured":"Liu, J., Kong, J., Hong, X., Gerla, M.: Performance evaluation of anonymous routing protocols in mobile Ad Hoc networks. In: IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, NV, USA, 3\u20136 April 2006"},{"key":"72_CR36","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep., Jet Prop. Lab. California Inst. Technol., Pasadena, CA, pp. 114\u2013116 (1978)"},{"key":"72_CR37","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proceedings of the 31st Symposium on Theory of Computer Science (STOC), Atlanta, GA, pp. 245\u2013254, 1\u20134 May 1999","DOI":"10.1145\/301250.301312"},{"key":"72_CR38","doi-asserted-by":"crossref","unstructured":"Orlando, G., Paar, C.: A Scalable GF(p) Elliptic curve processor architecture for programmable hardware. In: Cryptographic Hardware and Embedded Systems CHES 2001: Third International Workshop, Paris, France, 14\u201316 May 2001","DOI":"10.1007\/3-540-44709-1_29"},{"key":"72_CR39","unstructured":"OMNET++. http:\/\/www.omnetpp.org\/"},{"key":"72_CR40","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDNMixes: untraceable communication with very small bandwidth overhead. In: GI\/ITG Conference: Communication in Distributed Systems, pp.~451\u2013463 (1991)","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"72_CR41","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers (1994)","DOI":"10.1145\/190314.190336"},{"key":"72_CR42","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad Hoc on-demand distance vector (AODV) routing. RFC 3561, July 2003","DOI":"10.17487\/rfc3561"},{"key":"72_CR43","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure routing for mobile Ad Hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002). January 2002","DOI":"10.1201\/9781420040401.ch31"},{"key":"72_CR44","doi-asserted-by":"crossref","unstructured":"Seys, S., Preneel, B.: ARM: Anonymous routing protocol for mobile Ad Hoc networks. In: 20th International Conference on Advanced Information Networking and Applications (AINA), Vienna, Austria, April 2006","DOI":"10.1109\/AINA.2006.104"},{"key":"72_CR45","doi-asserted-by":"crossref","unstructured":"Song, R., Korba, L., Yee, G.: AnonDSR: Efficient anonymous dynamic source routing for mobile Ad-Hoc networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) (2005)","DOI":"10.1145\/1102219.1102226"},{"key":"72_CR46","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for Ad Hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP) (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"72_CR47","doi-asserted-by":"crossref","unstructured":"Sy, D., Chen, R., Bao, L.: ODAR: On-demand anonymous routing in Ad Hoc networks. Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference, pp. 267\u2013276, Vancouver, Canada, October 2006","DOI":"10.1109\/MOBHOC.2006.278565"},{"key":"72_CR48","unstructured":"Venkatraman, L., Agrawal, D.P.: Strategies for enhancing routing security in protocols for mobile Ad Hoc networks. In: Journal of Parallel and Distributed Computing, 63.2 (February 2003). Special issue on routing in mobile and wireless Ad Hoc networks, pp. 214\u2013227 (2003). ISSN:0743-7315"},{"key":"72_CR49","doi-asserted-by":"crossref","unstructured":"Yang, H., Meng, X., Lu, S.: Self-organized network-layer security in mobile Ad Hoc network. In: Proceedings of the ACM Workshop on Wireless Security, pp. 11\u201320 (2002)","DOI":"10.1145\/570681.570683"},{"key":"72_CR50","doi-asserted-by":"crossref","unstructured":"Yi, S., Naldurg, P., Kravets, R.: Security-aware Ad Hoc routing protocol for wireless networks. In: The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002) (2002)","DOI":"10.1145\/501416.501464"},{"key":"72_CR51","unstructured":"Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: Anonymous secure routing in mobile Ad Hoc networks. In: 29th IEEE International Conference on Local Computer Networks (LCN\u201904), pp. 102108, November 2004"},{"key":"72_CR52","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile Ad Hoc networks. In: IEEE INFOCOM (2005)","DOI":"10.1007\/0-387-22690-7_9"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0072-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-007-0072-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0072-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T02:15:27Z","timestamp":1684203327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-007-0072-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,25]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,11]]}},"alternative-id":["72"],"URL":"https:\/\/doi.org\/10.1007\/s11416-007-0072-y","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,25]]}}}