{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:51Z","timestamp":1773615591963,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700737","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:05Z","timestamp":1771936445000},"page":"1217-1223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Traffic Anonymization in Blockchain Systems Based on Garlic Routing"],"prefix":"10.3103","volume":"59","author":[{"given":"V. M.","family":"Krundyshev","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Skrypnikov","sequence":"additional","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7908_CR1","doi-asserted-by":"publisher","first-page":"54","DOI":"10.15827\/0236-235X.145.054-061","volume":"37","author":"M.A. Poltavtseva","year":"2024","unstructured":"Poltavtseva, M.A. and Zegzhda, D.P., Modeling information processes of big data management systems to solve cybersecurity problems, Programmnye Produkty i Sistemy, 2024, vol. 37, no. 1, pp. 54\u201361. https:\/\/doi.org\/10.15827\/0236-235X.145.054-061","journal-title":"Programmnye Produkty i Sistemy"},{"key":"7908_CR2","doi-asserted-by":"publisher","unstructured":"Busygin, A. and Konoplev, A., Blockchain for cybersecurity of government e-services: Decentralized architecture benefits and challenges, The Economics of Digital Transformation, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp.\u00a0187\u2013198. https:\/\/doi.org\/10.1007\/978-3-030-59959-1_12","DOI":"10.1007\/978-3-030-59959-1_12"},{"key":"7908_CR3","unstructured":"Bushmelev, A.S. and Busygin, A.G., Systematization and analysis of current distributed consensus algorithms for securing distributed smart city registries, Nedelya nauki IKNK: Materialy dokladov nauchno-prakticheskoi konferentsii (ICNC Science Week: Proceedings of the Scientific-Practical Conference), St. Petersburg, 2024, St.\u00a0Petersburg: Sankt-Peterburgskii Politekhnicheskii Universitet Petra Velikogo, 2024, pp. 53\u201354."},{"key":"7908_CR4","doi-asserted-by":"publisher","unstructured":"Parizi, R.M., Homayoun, S., Yazdinejad, A., Dehghantanha, A., and Choo, K.-K.R., Integrating privacy enhancing techniques into blockchains using sidechains, 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, Canada, 2019, IEEE, 2019, pp. 1\u20134. https:\/\/doi.org\/10.1109\/ccece.2019.8861821","DOI":"10.1109\/ccece.2019.8861821"},{"key":"7908_CR5","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.3103\/s0146411618080400","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P., Moskvin, D.A., and Myasnikov, A.V., Assurance of cyber resistance of the distributed data storage systems using the blockchain technology, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1111\u20131116. https:\/\/doi.org\/10.3103\/s0146411618080400","journal-title":"Autom. Control Comput. Sci."},{"key":"7908_CR6","doi-asserted-by":"publisher","unstructured":"Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81\u201385. https:\/\/doi.org\/10.1109\/worlds450073.2020.9210421","DOI":"10.1109\/worlds450073.2020.9210421"},{"key":"7908_CR7","unstructured":"Izhuninov, M.A., VPN technology: Characterization, Molodoi Uchenyi, 2019, no. 50, pp. 10\u201312."},{"key":"7908_CR8","doi-asserted-by":"publisher","unstructured":"Semenov, D.A. and Savilov, P.I., VPN and its protocol PPTP, Sovremennye Informatsionnye Tekhnologii i IT-Obrazovanie, 2018, no. 14, pp. 627\u2013630. https:\/\/doi.org\/10.25559\/SITITO.14.201803.578-585","DOI":"10.25559\/SITITO.14.201803.578-585"},{"key":"7908_CR9","doi-asserted-by":"publisher","first-page":"535","DOI":"10.17277\/vestnik.2019.04.pp.535-546","volume":"25","author":"I.G. Starun","year":"2019","unstructured":"Starun, I.G., Yuganson, A.N., and Gatchin, Yu.A., Building a mathematical model of calculation for VPN integrated assessment, Vestnik Tambovskogo Gosudarstvennogo Tehnicheskogo Universiteta, 2019, vol. 25, no. 4, pp.\u00a0535\u2013546. https:\/\/doi.org\/10.17277\/vestnik.2019.04.pp.535-546","journal-title":"Vestnik Tambovskogo Gosudarstvennogo Tehnicheskogo Universiteta"},{"key":"7908_CR10","unstructured":"Maxwell, G., CoinJoin: Bitcoin Privacy for the Real World. https:\/\/bitcointalk.org\/index.php?topic=279249. Cited February 1, 2025."},{"key":"7908_CR11","doi-asserted-by":"publisher","unstructured":"Ruffing, T., Moreno-Sanchez, P., and Kate, A., CoinShuffle: Practical decentralized coin mixing for Bitcoin, Computer Security\u2013ESORICS 2014, Kuty\u0142owski, M. and Vaidya, J., Eds., Lecture Notes in Computer Science, vol. 8713, Cham: Springer, 2014, pp. 345\u2013364. https:\/\/doi.org\/10.1007\/978-3-319-11212-1_20","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"7908_CR12","unstructured":"Bissias, G., Ozisik, A.P., Levine, B.N., and Liberatore, M., Sybil-resistant mixing for Bitcoin, Proceedings on Privacy Enhancing Technologies, 2018, pp. 1\u201310."},{"key":"7908_CR13","doi-asserted-by":"publisher","unstructured":"Erlingsson, U., Pihur, V., and Korolova, A., RAPPOR: Randomized aggregatable privacy-preserving ordinal response, ACM SIGSAC Conference on Computer and Communications Security, 2014, pp. 1\u201314. https:\/\/doi.org\/10.1145\/2660267.2660348","DOI":"10.1145\/2660267.2660348"},{"key":"7908_CR14","doi-asserted-by":"publisher","first-page":"386","DOI":"10.33581\/1561-4085-2020-23-4-386-396","volume":"23","author":"A.D. Dakhnovich","year":"2020","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Approach for securing network communications modelling based on smart multipath routing, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 386\u2013396. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-386-396","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7908_CR15","doi-asserted-by":"publisher","unstructured":"Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., and Felten, E.W., Mixcoin: Anonymity for Bitcoin with accountable mixes, Financial Cryptography and Data Security, Christin, N. and Safavi-Naini, R., Eds., Lecture Notes in Computer Science, vol. 8437, Berlin: Springer, 2014, pp. 486\u2013504. https:\/\/doi.org\/10.1007\/978-3-662-45472-5_31","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"7908_CR16","doi-asserted-by":"publisher","unstructured":"Ziegeldorf, J.H., Grossmann, F., Henze, M., Inden, N., and Wehrle, K., CoinParty: Secure multi-party mixing of Bitcoins, ACM Conference on Computer and Communications Security, 2015, pp. 75\u201386. https:\/\/doi.org\/10.1145\/2699026.2699100","DOI":"10.1145\/2699026.2699100"},{"key":"7908_CR17","doi-asserted-by":"publisher","unstructured":"Busygin, A. and Konoplev, A., Blockchain for cybersecurity of government e-services: Decentralized architecture benefits and challenges, The Economics of Digital Transformation, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 187\u2013198. https:\/\/doi.org\/10.1007\/978-3-030-59959-1_12","DOI":"10.1007\/978-3-030-59959-1_12"},{"key":"7908_CR18","doi-asserted-by":"publisher","unstructured":"Jadav, N.K., Gupta, R., Tanwar, S., and Bhattacharya, P., Intelligent garlic routing for securing data exchange in V2X communication, 2022 IEEE Globecom Workshops (GC Wkshps), Rio de Janeiro, 2022, IEEE, 2022, pp.\u00a0286\u2013291. https:\/\/doi.org\/10.1109\/gcwkshps56602.2022.10008525","DOI":"10.1109\/gcwkshps56602.2022.10008525"},{"key":"7908_CR19","first-page":"231","volume":"17","author":"D.A. Moskvin","year":"2014","unstructured":"Moskvin, D.A. and Gluhov, V.V., Using principles of fractal image compression for complexity estimation of the face recognition problem, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 231\u2013241.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7908_CR20","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.3103\/s0146411618080060","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Zegzhda, D.P., and Moskvin, D.A., Applying garlic routing to guarantee secure collaboration of segments in a digital manufacturing network, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1127\u20131133. https:\/\/doi.org\/10.3103\/s0146411618080060","journal-title":"Autom. Control Comput. Sci."},{"key":"7908_CR21","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.3103\/s0146411618080060","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Zegzhda, D.P., and Moskvin, D.A., Applying garlic routing to guarantee secure collaboration of segments in a digital manufacturing network, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1127\u20131133. https:\/\/doi.org\/10.3103\/s0146411618080060","journal-title":"Autom. Control Comput. Sci."},{"key":"7908_CR22","unstructured":"Mininet. https:\/\/mininet.org\/walkthrough\/. Cited February 1, 2025."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700737.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700737","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700737.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:58Z","timestamp":1773612118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7908"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700737","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"14 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}