{"id":"https://openalex.org/W2104864642","doi":"https://doi.org/10.1108/10662240610656528","title":"Regroup\u2010And\u2010Go mixes to counter the (<i>n</i>\u20101) attack","display_name":"Regroup\u2010And\u2010Go mixes to counter the (<i>n</i>\u20101) attack","publication_year":2006,"publication_date":"2006-03-01","ids":{"openalex":"https://openalex.org/W2104864642","doi":"https://doi.org/10.1108/10662240610656528","mag":"2104864642"},"language":"en","primary_location":{"id":"doi:10.1108/10662240610656528","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240610656528","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110292528","display_name":"Jinqiao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jin\u2010Qiao Shi","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China","(Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China)"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"(Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China)","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113587199","display_name":"Binxing Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin\u2010Xing Fang","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China","(Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China)"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"(Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China)","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021331404","display_name":"Li\u2010Jie Shao","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210135457","display_name":"Harbin Science and Technology Bureau","ror":"https://ror.org/03qdcb993","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210135457"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li\u2010Jie Shao","raw_affiliation_strings":["Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China","(Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China)"],"affiliations":[{"raw_affiliation_string":"Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I4210135457","https://openalex.org/I204983213"]},{"raw_affiliation_string":"(Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Beijing, China)","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110292528"],"corresponding_institution_ids":["https://openalex.org/I204983213","https://openalex.org/I4210135457"],"apc_list":null,"apc_paid":null,"fwci":0.4518,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73935402,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"16","issue":"2","first_page":"213","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.7987826466560364},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7233478426933289},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.64936363697052},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5608420968055725},{"id":"https://openalex.org/keywords/timeout","display_name":"Timeout","score":0.5557317137718201},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4625593423843384},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.45028361678123474},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.41812580823898315},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25338834524154663}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.7987826466560364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7233478426933289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.64936363697052},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5608420968055725},{"id":"https://openalex.org/C31691690","wikidata":"https://www.wikidata.org/wiki/Q1753979","display_name":"Timeout","level":2,"score":0.5557317137718201},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4625593423843384},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.45028361678123474},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.41812580823898315},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25338834524154663},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/10662240610656528","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240610656528","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W76901472","https://openalex.org/W1590765731","https://openalex.org/W1599111390","https://openalex.org/W1894333397","https://openalex.org/W1978884755","https://openalex.org/W2058972589","https://openalex.org/W2103647628","https://openalex.org/W2108668142","https://openalex.org/W2128735745","https://openalex.org/W2150248082","https://openalex.org/W2159657485","https://openalex.org/W2163674653","https://openalex.org/W2944132414","https://openalex.org/W4233978466"],"related_works":["https://openalex.org/W2001619020","https://openalex.org/W2318163330","https://openalex.org/W4362636126","https://openalex.org/W2117749464","https://openalex.org/W2113451084","https://openalex.org/W2094374755","https://openalex.org/W2008788431","https://openalex.org/W2045868190","https://openalex.org/W1982218871","https://openalex.org/W2048785841"],"abstract_inverted_index":{"Purpose":[0],"The":[1,117,133],"(":[2,47,65,87,175],"n":[3,48,66,88,176],"\u20101)":[4,49,67,89,177],"attack":[5,10,50,68,162,225,239],"is":[6,14,123,193,226],"the":[7,15,42,46,57,60,70,86,97,103,111,114,126,130,140,143,149,157,160,174,186,190,221,232,255],"most":[8],"powerful":[9],"against":[11],"mix":[12,36,79,122,158,168,230,244],"which":[13,201],"basic":[16],"building":[17],"block":[18],"of":[19,59,62,72,129,151,223],"many":[20],"modern":[21],"anonymous":[22],"systems.":[23],"This":[24],"paper":[25,76],"aims":[26],"to":[27,38,110,212],"present":[28],"a":[29,63,154,205,214],"strategy":[30],"that":[31,220],"can":[32,169,198,203,251],"be":[33,252],"implemented":[34],"in":[35,142,254],"networks":[37],"detect":[39,173],"and":[40,51,69,84,100,106,108,163,172,182,207,217,241,250],"counter":[41],"active":[43,238],"attacks,":[44],"especially":[45],"its":[52],"variants.":[53],"Design/methodology/approach":[54],"Based":[55],"on":[56],"analysis":[58],"preconditions":[61],"successful":[64,224],"limitations":[71],"previous":[73],"countermeasures,":[74],"this":[75],"presents":[77],"Regroup\u2010And\u2010Go":[78],"(RG":[80],"mix)":[81],"for":[82,120,189,195,237],"detecting":[83],"foiling":[85],"attack.":[90],"Messages":[91],"are":[92,135],"divided":[93],"into":[94],"groups":[95],"by":[96],"sender,":[98],"regrouped":[99],"forwarded":[101,136],"at":[102,113],"intermediate":[104],"mixes,":[105],"reordered":[107],"sent":[109],"receiver":[112],"last":[115],"mix.":[116,132],"grouping":[118,187],"information":[119,188],"each":[121],"encrypted":[124],"with":[125],"public":[127],"key":[128],"corresponding":[131],"messages":[134,141,152,202,211,236],"only":[137,199],"when":[138],"all":[139],"same":[144],"group":[145,206],"have":[146,213,247],"arrived.":[147],"When":[148],"regrouping":[150],"triggers":[153],"timeout":[155],"alert,":[156],"detects":[159],"ongoing":[161],"takes":[164],"countermeasures.":[165],"Findings":[166],"RG":[167,229,243],"help":[170],"foil":[171],"attacks":[178],"from":[179],"both":[180],"internal":[181],"external":[183],"attackers":[184],"because":[185],"other":[191],"mixes":[192],"unavailable":[194],"them.":[196],"They":[197],"guess":[200],"constitute":[204],"randomly":[208],"select":[209],"some":[210],"try.":[215],"Analysis":[216],"experiments":[218],"show":[219],"probability":[222],"low.":[227],"Originality/value":[228],"uses":[231],"hidden":[233],"correlations":[234],"between":[235],"prevention":[240],"detection.":[242],"does":[245],"not":[246],"unpractical":[248],"requirements":[249],"used":[253],"real\u2010world":[256],"implementations.":[257]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
