{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:34:35Z","timestamp":1742387675628,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/mahss.2004.1392180","type":"proceedings-article","created":{"date-parts":[[2005,2,22]],"date-time":"2005-02-22T15:29:50Z","timestamp":1109086190000},"page":"406-415","source":"Crossref","is-referenced-by-count":3,"title":["A mix route algorithm for mix-net in wireless mobile ad hoc networks"],"prefix":"10.1109","author":[{"family":"Shu Jiang","sequence":"first","affiliation":[]},{"given":"N.H.","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501438"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/49.779926"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"13","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","article-title":"Traffic analysis: Protocols, attacks, design issues and open problems","volume":"2009","author":"raymond","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44448-3_14","article-title":"A length-invariant hybrid mix","volume":"1976","author":"ohkubo","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Isdn-mixes Untraceable Communication with Very Small Bandwidth Overhead","year":"1991","author":"pfitzmann","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492350"},{"key":"2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","article-title":"Web mixes: A system for anonymous and unobservable internet access","volume":"2009","author":"berthold","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"ns notes and documentation","year":"2003","author":"berkeley","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/778445.778449"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384046"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"5","first-page":"105","article-title":"Security in public mobile communication networks","author":"federrath","year":"1995","journal-title":"Proc Personal Wireless Communications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49380-8_7","article-title":"Stop-and-go mixes: Providing probabilistic anonymity in an open system","volume":"1525","author":"kesdogan","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"}],"event":{"name":"2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems","acronym":"MAHSS-04","location":"Fort Lauderdale, FL, USA"},"container-title":["2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9587\/30305\/01392180.pdf?arnumber=1392180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T12:09:30Z","timestamp":1497614970000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1392180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/mahss.2004.1392180","relation":{},"subject":[]}}