{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:57:01Z","timestamp":1729677421287,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134263","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Waypoint Routing: A Network Layer Privacy Framework"],"prefix":"10.1109","author":[{"given":"A.","family":"Matos","sequence":"first","affiliation":[]},{"given":"S.","family":"Sargento","sequence":"additional","affiliation":[]},{"given":"R. L.","family":"Aguiar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2005","author":"soliman","key":"ref10"},{"year":"2009","author":"leung","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.comcom.2009.11.009","article-title":"Survey on anonymous communications in computer networks","volume":"33","author":"ren","year":"2010","journal-title":"Computer Communications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"journal-title":"Anonymity and the tor network","year":"2008","author":"schneier","key":"ref4"},{"key":"ref3","first-page":"21","article-title":"Tor: The second-generation onion router","volume":"13","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref5","first-page":"39","article-title":"Onion routing for anonymous and private internet connections","volume":"42","author":"syverson","year":"0","journal-title":"Communications of the ACM"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/11556114_3","article-title":"Simulation of obfuscation and negotiation for location privacy","volume":"3693","author":"duckham","year":"2005","journal-title":"Spatial Information Theory"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0239-5_14"},{"journal-title":"How accurate is geolocation","article-title":"What Is My IP Address","year":"2010","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1186699.1186716"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134263.pdf?arnumber=6134263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T09:31:56Z","timestamp":1497951116000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134263","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}