{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:05:17Z","timestamp":1763967917434,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102219.1102226","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"33-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":82,"title":["AnonDSR"],"prefix":"10.1145","author":[{"given":"Ronggong","family":"Song","sequence":"first","affiliation":[{"name":"National Research Council Canada, Ottawa, ON, Canada"}]},{"given":"Larry","family":"Korba","sequence":"additional","affiliation":[{"name":"National Research Council Canada, Ottawa, ON, Canada"}]},{"given":"George","family":"Yee","sequence":"additional","affiliation":[{"name":"National Research Council Canada, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"e_1_3_2_1_2_1","volume-title":"Oct.","author":"Broch J.","year":"1999","unstructured":"J. Broch , D. Johnson , and D. Maltz . The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-03.txt , Oct. 1999 . J. Broch, D. Johnson, and D. Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-03.txt, Oct. 1999."},{"key":"e_1_3_2_1_3_1","first-page":"139","volume-title":"Ad Hoc Networking","author":"Johnson D.","year":"2001","unstructured":"D. Johnson , D. Maltz , and J. Broch . DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks . In C. Perkins, editor, Ad Hoc Networking , chapter 5, pp. 139 -- 172 . Addison-Wesley , 2001 . D. Johnson, D. Maltz, and J. Broch. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. In C. Perkins, editor, Ad Hoc Networking, chapter 5, pp. 139--172. Addison-Wesley, 2001."},{"key":"e_1_3_2_1_4_1","volume-title":"Secure Communication for Multi-Hop Ad-Hoc Network. IEEE TENCON 2003","author":"Vetriselvi V.","year":"2003","unstructured":"V. Vetriselvi and R. Parthasarathi . Secure Communication for Multi-Hop Ad-Hoc Network. IEEE TENCON 2003 . Available at-http:\/\/www.ewh.ieee.org\/ecc\/r10\/Tencon 2003 \/Articles\/737.pdf. V. Vetriselvi and R. Parthasarathi. Secure Communication for Multi-Hop Ad-Hoc Network. IEEE TENCON 2003. Available at-http:\/\/www.ewh.ieee.org\/ecc\/r10\/Tencon2003\/Articles\/737.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.531"},{"key":"e_1_3_2_1_6_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A.","year":"1997","unstructured":"A. Menezes , P. Oorschot , and S. Vanstone . Handbook of Applied Cryptography . CRC Press Inc ., 1997 . A. Menezes, P. Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press Inc., 1997."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceeding of the 14th Annual Canadian Information Technology Security Symporium","author":"Song R.","year":"2002","unstructured":"R. Song and L. Korba . Review of Network-Based Approaches for Privacy . In Proceeding of the 14th Annual Canadian Information Technology Security Symporium , Ottawa, Canada . May . 2002 . NRC 44905. R.Song and L.Korba. Review of Network-Based Approaches for Privacy. In Proceeding of the 14th Annual Canadian Information Technology Security Symporium, Ottawa, Canada. May. 2002. NRC 44905."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778449"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240390"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceeding of the first International Workshop on Mobility Aware Technologies and Applications (MATA'04)","author":"Korba L.","year":"2004","unstructured":"L. Korba and R. Song . Scalability, Security Technologies and Mobile Applications . In Proceeding of the first International Workshop on Mobility Aware Technologies and Applications (MATA'04) , 2004 . NRC 47169. L. Korba and R. Song. Scalability, Security Technologies and Mobile Applications. In Proceeding of the first International Workshop on Mobility Aware Technologies and Applications (MATA'04), 2004. NRC 47169."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023756.1023763"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.109"},{"key":"e_1_3_2_1_15_1","unstructured":"The Network\n     Simulator - ns-2.\n   Available at http:\/\/www.isi.edu\/nsnam\/ns\/. \n  May 2005\n  .  The Network Simulator - ns-2. Available at http:\/\/www.isi.edu\/nsnam\/ns\/. May 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of CNDS'02","author":"Papadimitratos P.","year":"2002","unstructured":"P. Papadimitratos and Z. J. Haas . Secure Routing for Mobile Ad Hoc Networks . In Proceedings of CNDS'02 , San Antonio, TX, USA , Jan. 2002 . P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad Hoc Networks. In Proceedings of CNDS'02, San Antonio, TX, USA, Jan. 2002."},{"key":"e_1_3_2_1_18_1","unstructured":"IAIK. Institute for Applied Information Processing and Communications. Available at http:\/\/jcewww.iaik.tu-graz.ac.at\/.  IAIK. Institute for Applied Information Processing and Communications. Available at http:\/\/jcewww.iaik.tu-graz.ac.at\/."}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102219.1102226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:08Z","timestamp":1750262888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102226"}},"subtitle":["efficient anonymous dynamic source routing for mobile ad-hoc networks"],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":18,"alternative-id":["10.1145\/1102219.1102226","10.1145\/1102219"],"URL":"https:\/\/doi.org\/10.1145\/1102219.1102226","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}