{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:02:42Z","timestamp":1725757362319},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/glocom.2007.20","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T20:40:17Z","timestamp":1199479217000},"page":"64-69","source":"Crossref","is-referenced-by-count":11,"title":["Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks"],"prefix":"10.1109","author":[{"given":"Olaf","family":"Landsiedel","sequence":"first","affiliation":[]},{"given":"Alexis","family":"Pimenidis","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Niedermayer","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Speeding up Secure Web Transactions Using Elliptic Curve Cryptography","author":"gupta","year":"2004","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"18","article-title":"Mixmaster Protocol -Version 2","author":"mo?ller","year":"2003","journal-title":"DRAFT"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/VETEC.1996.501454"},{"key":"16","article-title":"Message Splitting Against the Partial Adversary","author":"serjantov","year":"2005","journal-title":"Proc Workshop on Privacy Enhancing Technologies"},{"key":"13","article-title":"Information slicing: Anonymity using unreliable overlays","author":"katti","year":"2007","journal-title":"Proc USENIX Symposium on Network Systems and Design and Implementation (NSDI)"},{"key":"14","article-title":"Analysis of security and privacy in mobile ip","author":"fasbender","year":"1996","journal-title":"Proc 4th Int Conf Telecommun Syst Modeling and Analysis"},{"key":"11","article-title":"AP3: A cooperative, decentralized service providing anonymous communication","author":"mislove","year":"2004","journal-title":"Proc of ACM SIGOPS European Workshop"},{"key":"12","article-title":"Cashmere: Resilient Anonymous Routing","author":"zhuang","year":"2005","journal-title":"Proc of Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886738"},{"key":"20","article-title":"Security Considerations for Dynamic Multipath Onion Routing","author":"landsiedel","year":"2007","journal-title":"DRAFT"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064415"},{"key":"23","article-title":"Overlay tcp for multi-path routing and congestion control","author":"han","year":"2003","journal-title":"ENS-INRIA ARC-TCP Workshop"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286490"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.08.005"},{"key":"3","article-title":"Locating Hidden Servers","author":"overlier","year":"2006","journal-title":"Proc IEEE Symp Security and Privacy (SSP)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601314"},{"year":"0","key":"7"},{"key":"6","article-title":"Tor: The Second-Generation Onion Router","author":"dingledine","year":"2004","journal-title":"Proc of 13th USENIX Security Symposium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"8","article-title":"Web MIXes: A system for anonymous and unobservable Internet access","author":"berthold","year":"2000","journal-title":"Designing Privacy Enhancing Technologies Proc Int l Workshop Design Issues in Anonymity and Observability"}],"event":{"name":"IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference","start":{"date-parts":[[2007,11,26]]},"location":"Washington, DC, USA","end":{"date-parts":[[2007,11,30]]}},"container-title":["IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4410909\/4410910\/04410930.pdf?arnumber=4410930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:39:54Z","timestamp":1489678794000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4410930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/glocom.2007.20","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}