{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:58:23Z","timestamp":1725541103573},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/istel.2018.8661049","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T18:58:46Z","timestamp":1551985126000},"page":"58-64","source":"Crossref","is-referenced-by-count":0,"title":["Public-Key Based Routing In Internet For Anonymous Data Communication"],"prefix":"10.1109","author":[{"given":"Reza","family":"Mirzaei","sequence":"first","affiliation":[]},{"given":"Reza","family":"Farahani","sequence":"additional","affiliation":[]},{"given":"Naser","family":"Yazdani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601314"},{"article-title":"Freedom network 1.0 architecture","year":"1999","author":"goldberg","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-61996-8_37","article-title":"Hiding routing information","author":"goldschlag","year":"1996","journal-title":"Proceedings of Information Hiding First International Workshop"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004362"},{"article-title":"I2P data communication system","year":"0","author":"bassam","key":"ref16"},{"journal-title":"Tor The second-generation onion router","year":"0","key":"ref4"},{"journal-title":"Motion to enforce July 24 2002 subpoena","year":"2002","author":"verizon","key":"ref3"},{"journal-title":"The Anonymizer","year":"0","key":"ref6"},{"journal-title":"The Invisible Internet Project (I2P)","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref7","article-title":"Deanonymizing users of the safeweb anonymizing service","author":"martin","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"journal-title":"Carnivore diagnostic tool","year":"0","key":"ref2"},{"article-title":"China&#x2019;s Golden Shield: Corporations and the development of surveillance technology in the People&#x2019;s Republic of China","year":"2001","author":"walton","key":"ref1"},{"journal-title":"Electronic Frontiers Georgia (EFGA) Anonymous remailer information","year":"0","key":"ref9"}],"event":{"name":"2018 9th International Symposium on Telecommunications (IST)","start":{"date-parts":[[2018,12,17]]},"location":"Tehran, Iran","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 9th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8653247\/8660802\/08661049.pdf?arnumber=8661049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:52:36Z","timestamp":1643244756000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8661049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/istel.2018.8661049","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}