{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:43:13Z","timestamp":1729636993200,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541798","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T15:51:40Z","timestamp":1281455500000},"page":"349-353","source":"Crossref","is-referenced-by-count":1,"title":["An efficient routing protocol for anonymous networks"],"prefix":"10.1109","author":[{"given":"Roman","family":"Schlegel","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"journal-title":"I2P Anonymous Network","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.63"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4271","article-title":"A Border Gateway Protocol 4 (BGP-4)","author":"rekhter","year":"2006"},{"journal-title":"University of Regensburg JAP anonymity & privacy","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_15"},{"key":"ref17","first-page":"102","article-title":"Anonymous secure routing in mobile ad-hoc networks. In Local Computer Networks, 2004","author":"zhu","year":"2004","journal-title":"29th Annual International Conference"},{"key":"ref18","first-page":"301","article-title":"Cashmere: Resilient anonymous routing","author":"zhuang","year":"2005","journal-title":"In NSDI 05 2nd Symposium on Networked Systems Design & Implementation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","article-title":"Authenticated Diffie-Hellman key agreement protocols","volume":"1556","author":"blake-wilson","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"ref7","first-page":"303","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"In Proceedings of the 13th USENIX Security Symnosium"},{"key":"ref2","first-page":"927","article-title":"Improved BGP convergence via ghost flushing. INFOCOM 2003","volume":"2","author":"afek","year":"2003","journal-title":"Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"ref1","article-title":"Operation of anycast services","author":"abley","year":"2006","journal-title":"RFC 4786 (Best Current Practice)"},{"key":"ref9","article-title":"Herbivore: A scalable and efficient protocol for anonymous communication","author":"goel","year":"2003","journal-title":"Technical Report TR2003&#x2013;1890 Cornell University Computing and Information Science"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541798.pdf?arnumber=5541798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:04:41Z","timestamp":1559401481000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541798","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}