{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:39Z","timestamp":1750307679211,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0831963"],"award-info":[{"award-number":["CNS-0831963"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533106","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"368-371","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Anonymous user communication for privacy protection in wireless metropolitan mesh networks"],"prefix":"10.1145","author":[{"given":"Zhiguo","family":"Wan","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology"}]},{"given":"Bo","family":"Zhu","sequence":"additional","affiliation":[{"name":"Concordia University"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"K. U. Leuven"}]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1016\/j.comnet.2004.12.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/3-540-46416-6_22"},{"unstructured":"W. Dai. Crypto++ Benchmarks.  W. Dai. Crypto++ Benchmarks.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"153","volume":"353","author":"Johnson D. B.","year":"1996","unstructured":"D. B. Johnson and D. A. Maltz . Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing , volume 353 , pages 153 -- 181 , 1996 . D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, volume 353, pages 153--181, 1996.","journal-title":"Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/MWC.2009.5281259"},{"unstructured":"Microsoft. Self organizing neighborhood wireless mesh networks http:\/\/www.research.microsoft.com\/mesh\/.  Microsoft. Self organizing neighborhood wireless mesh networks http:\/\/www.research.microsoft.com\/mesh\/.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/ICDCS.2008.18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/WOWMOM.2006.91"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1180345.1180348"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"Asia CCS 09","name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","location":"Sydney Australia"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":9,"alternative-id":["10.1145\/1533057.1533106","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533106","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}