{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:11:21Z","timestamp":1747807881346},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iwnas.2006.40","type":"proceedings-article","created":{"date-parts":[[2006,8,15]],"date-time":"2006-08-15T17:58:12Z","timestamp":1155664692000},"page":"103-110","source":"Crossref","is-referenced-by-count":1,"title":["Resilient P2P Anonymous Routing by Using Redu"],"prefix":"10.1109","author":[{"family":"Yingwu Zhu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"22","article-title":"Cashmere: Resilient anonymous routing","author":"zhuang","year":"2005","journal-title":"Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004362"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352607"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0088-1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992907"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45518-3_18"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"year":"0","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.26"},{"journal-title":"Anonymous Remailer","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"5","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"8","article-title":"Efficient routing for peer-to-peer overlays","author":"gupta","year":"2004","journal-title":"Proc of Symposium on Networked Systems Design and Implementation (NSDI)"}],"event":{"name":"2006 International Workshop on Networking, Architecture, and Storages (IWNAS'06)","location":"Shenyang, China"},"container-title":["2006 International Workshop on Networking, Architecture, and Storages (IWNAS'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11002\/34686\/01654542.pdf?arnumber=1654542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T16:22:15Z","timestamp":1489594935000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1654542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iwnas.2006.40","relation":{},"subject":[]}}