{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:40:07Z","timestamp":1744872007924,"version":"3.40.4"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2001,3,1]],"date-time":"2001-03-01T00:00:00Z","timestamp":983404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2001,3]]},"DOI":"10.1109\/49.917714","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T18:17:23Z","timestamp":1030213043000},"page":"552-565","source":"Crossref","is-referenced-by-count":9,"title":["Active routing"],"prefix":"10.1109","volume":"19","author":[{"given":"N.F.","family":"Maxemchuk","sequence":"first","affiliation":[]},{"given":"S.H.","family":"Low","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TCOM.1980.1094721"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/5.52205"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/4236.793463"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/35.809383"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/35.809384"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/35.809385"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/316194.316231"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/231699.231701"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/65.690959"},{"volume-title":"Computer Networking.","year":"2001","author":"Kurose","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/268998.266668"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/opnarc.1999.758429"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/IWQOS.1998.675213"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/52325.52336"},{"volume-title":"Sigcomm","author":"Stoica","article-title":"Core-stateless fair queuing: Achieving approximately fair bandwidth allocations in high speed networks","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/90.251913"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/90.477727"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/49.76630"},{"key":"ref19","first-page":"69","article-title":"Privacy protected payments: Unconditional payer and\/or payee untraceability","volume-title":"Proc. Smart Card","author":"Chaum"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CSAC.1992.228222"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/168588.168601"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/3-540-46766-1_27"},{"key":"ref23","first-page":"1993","article-title":"Internet billing server prototype scope document","volume-title":"INI Techn. Rep.","author":"Sirbu","year":"1993"},{"key":"ref24","first-page":"151","article-title":"Methodology for digital money based on general cryptographic tools","volume-title":"Proc. Eurocrypt","author":"D\u2019Amiano"},{"key":"ref25","first-page":"311","article-title":"Single-term divisible electronic coins","volume-title":"Proc. Eurocrypt","author":"Eng"},{"volume-title":"6th USENIX UNIX Security Symp.","author":"Tang","article-title":"Chrg-http: A tool for micropayments on the world wide WEB","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/S0169-7552(97)00066-4"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/S1389-1286(00)00084-0"},{"key":"ref29","first-page":"55","article-title":"Multicast routing in internetworks and extended LAN\u2019s","volume-title":"ACM SIGCOMM","author":"Deering"},{"key":"ref30","first-page":"41\u201310","article-title":"Dispersity routing","volume-title":"Proc. ICC","author":"Maxemchuk"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/65.826367"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/65.238150"},{"volume-title":"Game Theory.","year":"1996","author":"Fudenberg","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/JSAC.1986.1146468"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/35.809386"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.17487\/rfc1102"},{"key":"ref37","first-page":"233","article-title":"The design of a secure Internet gateway","volume-title":"Proc. Usenix Summer Conf.","author":"Cheswick"},{"key":"ref38","article-title":"What is a VPN?","author":"Ferguson","year":"1998","journal-title":"Cisco Systems; Telstra Internet"},{"volume-title":"TCP Trunking","year":"1998","author":"Kung","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/NOSDAV.1997.629368"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/90.779203"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/INFCOM.1994.337668"},{"volume-title":"Proc. IEEE GLOBECOM.","author":"Seddigh","first-page":"6","key":"ref43"},{"key":"ref44","first-page":"73","article-title":"Diffserv and MPLS\u2014A quality choice\u2014The diffserv and MPLS specs both address IP QOS, only they go about it in different ways","author":"Stephenson","year":"1998","journal-title":"Data Commun."},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/ICNP.1998.723723"},{"key":"ref46","first-page":"145","article-title":"Zhao-X; Castelluccia-C; Baker-M","volume-title":"Proc. IEEEI\/ACM MobiCom","author":"Zhao"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1145\/285243.285281"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ICSMC.1998.728051"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/49\/19828\/00917714.pdf?arnumber=917714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:03:20Z","timestamp":1744869800000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/917714\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,3]]},"references-count":48,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/49.917714","relation":{},"ISSN":["0733-8716"],"issn-type":[{"type":"print","value":"0733-8716"}],"subject":[],"published":{"date-parts":[[2001,3]]}}}