{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:57:01Z","timestamp":1729673821511,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccitechnology.2013.6579544","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:36Z","timestamp":1377709896000},"page":"173-178","source":"Crossref","is-referenced-by-count":0,"title":["Low overhead anonymous routing"],"prefix":"10.1109","author":[{"given":"Alaa","family":"Atassi","sequence":"first","affiliation":[]},{"given":"Imad","family":"Sarji","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Imad","family":"Elhaj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"System and Method for Protecting Privacy and Anonymity of Parties of Network Communications","year":"2010","author":"wang","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCA.2007.4365477"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"1","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.comcom.2009.11.009","article-title":"Survey on anonymous communications in computer networks","volume":"33","author":"ren","year":"2010","journal-title":"Comput Commun"},{"key":"7","article-title":"Design of a blockingresistant anonymity system. The tor project","author":"dingledine","year":"2006","journal-title":"Technical Report"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_11"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.20"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WCINS.2010.5541798"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15141-5_6"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/11957454_2","article-title":"Ignoring the great firewall of china","author":"clayton","year":"2006","journal-title":"Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)"},{"key":"11","first-page":"115129","article-title":"Web mixes: A system for anonymous and unobservable internet access","author":"berthold","year":"2000","journal-title":"Designing Privacy Enhancing Technologies Workshop on Design Issue in Anonymity and Unobservability"},{"key":"12","first-page":"175","article-title":"Trustbased anonymous communication: Adversary models and routing algorithms","author":"johnson","year":"2011","journal-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security"}],"event":{"name":"2013 International Conference on Communications and Information Technology (ICCIT)","start":{"date-parts":[[2013,6,19]]},"location":"Beirut, Lebanon","end":{"date-parts":[[2013,6,21]]}},"container-title":["2013 Third International Conference on Communications and Information Technology (ICCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573243\/6579508\/06579544.pdf?arnumber=6579544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:53:22Z","timestamp":1498064002000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccitechnology.2013.6579544","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}