{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:19:08Z","timestamp":1729671548395,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ipdps.2006.1639683","type":"proceedings-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T15:59:56Z","timestamp":1152547196000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":0,"title":["Shubac: a searchable P2P network utilizing dynamic paths for client\/server anonymity"],"prefix":"10.1109","author":[{"given":"A.","family":"Brodie","sequence":"first","affiliation":[]},{"family":"Cheng-Zhong Xu","sequence":"additional","affiliation":[]},{"family":"Weisong Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/502034.502053"},{"key":"16","article-title":"Mutual anonymity protocols for hybrid peer-to-peer systems","author":"xiao","year":"2003","journal-title":"Proc 1st Int Conf Distributed Comp Syst"},{"year":"0","journal-title":"Mute","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/290163.290168"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"12","doi-asserted-by":"crossref","first-page":"213","DOI":"10.3233\/JCS-2002-10302","article-title":"Hordes: A multicast-based protocol for anonymity","volume":"10","author":"levine","year":"2002","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/863955.864000"},{"key":"2","first-page":"319","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"2000","journal-title":"Proc Usenix Large Installation System Administration Conf"},{"year":"2004","author":"bono","article-title":"Mantis: A Lightweight, Server-anonymity preserving, searchable P2P network","key":"1"},{"year":"2000","author":"greenfeld","journal-title":"TIME Magazine","key":"10"},{"key":"7","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proc of USENIX Security Symposium"},{"key":"6","article-title":"The Sybil attack","author":"douceur","year":"2002","journal-title":"Proc IPTPS"},{"key":"5","article-title":"Queryflood DoS attacks in gnutella","author":"daswani","year":"2002","journal-title":"Proc of ACM Conf on Computer and Communications Security"},{"key":"4","first-page":"46","article-title":"Freenet: A distributed anonymous information storage and retrieval system","author":"clarke","year":"2000","journal-title":"Proc Designing Privacy Enhancing Technologies Workshop"},{"year":"0","journal-title":"Gnutella","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/586110.586137"}],"event":{"name":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium","start":{"date-parts":[[2006,4,25]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10917\/34366\/01639683.pdf?arnumber=1639683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:22:49Z","timestamp":1555701769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1639683\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2006.1639683","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}