{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:53:44Z","timestamp":1729641224023,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/cisis.2012.14","type":"proceedings-article","created":{"date-parts":[[2012,7,31]],"date-time":"2012-07-31T17:51:28Z","timestamp":1343757088000},"page":"156-163","source":"Crossref","is-referenced-by-count":2,"title":["Split Message-Based Anonymity for JXTA Applications"],"prefix":"10.1109","author":[{"given":"Joan","family":"Arnedo-Moreno","sequence":"first","affiliation":[]},{"given":"Noemi","family":"Perez-Gilabert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1109\/TPDS.2007.70805","article-title":"Mutual anonymity for mobile p2p systems","volume":"19","author":"han","year":"2008","journal-title":"Parallel and Distributed Systems"},{"journal-title":"Advanced Encryption Standard (AES)","year":"2001","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925093"},{"key":"23","first-page":"8377","volume":"21","author":"deters","year":"2005","journal-title":"The JXTA Performance Model and Evaluation"},{"key":"18","article-title":"A mutual anonymous peer-to-peer protocol design","author":"han","year":"2005","journal-title":"Parallel and Distributed Processing Symposium"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"16","article-title":"Mix-master protocol version 2. technical report","author":"moeller","year":"2004","journal-title":"Internet-draft"},{"key":"13","first-page":"307","article-title":"Threshold cryptosystems","author":"desmedt","year":"1989","journal-title":"Advances in Cryptology ? CRYPTO? 89 Proceedings"},{"key":"14","first-page":"67","article-title":"The free haven project: Distributed anonymous storage service","author":"freedman","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"11","article-title":"How to disappera completely: A survey of private peer-to-peer networks","author":"bhatti","year":"2007","journal-title":"Proceedings of International Workshop on Sustaining Privacy in Autonomous Collaborative Environments (SPACE)"},{"key":"12","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1007\/s11390-008-9162-7","article-title":"Survey on anonymity in unstructured peer-to-peer systems","volume":"23","author":"ren-yi","year":"2008","journal-title":"Journal of Computer Science and Technology"},{"journal-title":"PKCS1 Rsa Cryptography Specifications","year":"1998","author":"staddon","key":"21"},{"key":"3","first-page":"37","author":"matsuo","year":"2009","journal-title":"Experimental Results and Evaluation of Smartbox Stimulation Device in a P2P E-learning System"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.98"},{"journal-title":"Connex Project Homepage","year":"2007","key":"2"},{"journal-title":"Jxta v2 0 protocols specification","year":"2007","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E95.D.169"},{"key":"7","first-page":"44","article-title":"Anonymous connections and onion routing","author":"goldsclag","year":"1997","journal-title":"Proceeding of the IEEE 18th Annual Symposium on Security and Privacy"},{"journal-title":"Anonymity Unlinkability Undetectability Unobserv-ability Pseudonymity and Identity Management a Consolidated Proposal for Terminology","year":"2008","author":"hansen","key":"6"},{"journal-title":"JXSE The Java Implementation of the JXTA Protocols","year":"2011","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1557914.1557974"},{"key":"9","first-page":"66","article-title":"Crowds: Anonymity for web transactions","volume":"1","author":"rubin","year":"2004","journal-title":"ACM Transactions on Information and System Security"},{"key":"8","first-page":"303","article-title":"Tor: The second generation onion router","author":"mathewson","year":"1998","journal-title":"Proceeding of the 13th USENIX Security Symposium"}],"event":{"name":"2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","start":{"date-parts":[[2012,7,4]]},"location":"Palermo, Italy","end":{"date-parts":[[2012,7,6]]}},"container-title":["2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6243993\/6245569\/06245577.pdf?arnumber=6245577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:16:19Z","timestamp":1497982579000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6245577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cisis.2012.14","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}