{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:51:10Z","timestamp":1729619470256,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/isit.2009.5205797","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T11:09:52Z","timestamp":1251112192000},"page":"1629-1633","source":"Crossref","is-referenced-by-count":1,"title":["On an information theoretic approach to model anonymous MANET communications"],"prefix":"10.1109","author":[{"given":"Dijiang","family":"Huang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology","author":"pfitzmann","year":"2006","journal-title":"Working draft avaliable at http \/\/dud inf tu- dresden delliteraturlAnon-Terminology-vO 28 doc"},{"year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/778445.778449"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"18","first-page":"145","article-title":"wi-fi in ad hoc mode: a measurement study","author":"anastasi","year":"2004","journal-title":"Proceedings of IEEE Annual Copnference on Pervasive Computing and Communications (PER COM)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.07.040"},{"key":"16","article-title":"tor: the secondgeneration onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/941326.941334"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/2.940014"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.1687761"},{"key":"12","article-title":"olar: on-demand lightweight anonymous routing in manets","author":"qin","year":"2008","journal-title":"The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU) (Best paper award)"},{"journal-title":"Uncertainty-Based Information","year":"1998","author":"klir","key":"21"},{"key":"3","first-page":"85","article-title":"measuring anonymity revisited","author":"to?th","year":"2004","journal-title":"Proceedings of the Ninth Nordic Workshop on Secure IT Systems"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1928.tb01236.x"},{"key":"2","first-page":"41","article-title":"towards an information theoretic metric for anonymity","author":"serjantov","year":"2002","journal-title":"Proceedings of Privacy Enhancing Technologies"},{"key":"1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","article-title":"towards measuring anonymity","volume":"2482","author":"diaz","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102226"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.109"},{"key":"6","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/11542322_27","article-title":"war: wireless anonymous routing","volume":"3364","author":"blaze","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1021"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2007.23"},{"key":"8","first-page":"133","article-title":"arm: anonymous routing protocol for mobile ad hoc networks","author":"seys","year":"2006","journal-title":"Proceedings of of the 20th IEEE International Conference on Advanced Information Networking and Applications Workshops (AINA 2006 Workshops)"}],"event":{"name":"2009 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2009,6,28]]},"location":"Seoul, South Korea","end":{"date-parts":[[2009,7,3]]}},"container-title":["2009 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5179947\/5205248\/05205797.pdf?arnumber=5205797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T20:36:26Z","timestamp":1633811786000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5205797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isit.2009.5205797","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}