{"id":"https://openalex.org/W2019631730","doi":"https://doi.org/10.1109/icnss.2011.6060022","title":"R5N: Randomized recursive routing for restricted-route networks","display_name":"R5N: Randomized recursive routing for restricted-route networks","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2019631730","doi":"https://doi.org/10.1109/icnss.2011.6060022","mag":"2019631730"},"language":"en","primary_location":{"id":"doi:10.1109/icnss.2011.6060022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnss.2011.6060022","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 5th International Conference on Network and System Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054783600","display_name":"Nathan S. Evans","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Nathan S. Evans","raw_affiliation_strings":["Technische Universit\u00e4t M\u00fcnchen, Munich, Germany","Technische Universit\u00e4t M\u00fcnchen Munich Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technische Universit\u00e4t M\u00fcnchen Munich Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039190860","display_name":"Christian Grothoff","orcid":"https://orcid.org/0000-0002-6858-6808"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Grothoff","raw_affiliation_strings":["Technische Universit\u00e4t M\u00fcnchen, Munich, Germany","Technische Universit\u00e4t M\u00fcnchen Munich Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t M\u00fcnchen, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technische Universit\u00e4t M\u00fcnchen Munich Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054783600"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":3.6542,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.92931297,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"316","last_page":"321"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.7878706455230713},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7855620384216309},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.6995842456817627},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6036251783370972},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5817976593971252},{"id":"https://openalex.org/keywords/static-routing","display_name":"Static routing","score":0.5643913745880127},{"id":"https://openalex.org/keywords/routing-algorithm","display_name":"Routing algorithm","score":0.5489259362220764},{"id":"https://openalex.org/keywords/policy-based-routing","display_name":"Policy-based routing","score":0.533440887928009},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.48518139123916626},{"id":"https://openalex.org/keywords/dynamic-source-routing","display_name":"Dynamic Source Routing","score":0.45889851450920105},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.42990145087242126},{"id":"https://openalex.org/keywords/network-routing","display_name":"Network routing","score":0.4152452349662781}],"concepts":[{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.7878706455230713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7855620384216309},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.6995842456817627},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6036251783370972},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5817976593971252},{"id":"https://openalex.org/C204948658","wikidata":"https://www.wikidata.org/wiki/Q1119410","display_name":"Static routing","level":4,"score":0.5643913745880127},{"id":"https://openalex.org/C2984173633","wikidata":"https://www.wikidata.org/wiki/Q22725","display_name":"Routing algorithm","level":4,"score":0.5489259362220764},{"id":"https://openalex.org/C196423136","wikidata":"https://www.wikidata.org/wiki/Q7209671","display_name":"Policy-based routing","level":5,"score":0.533440887928009},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.48518139123916626},{"id":"https://openalex.org/C9659607","wikidata":"https://www.wikidata.org/wiki/Q1268903","display_name":"Dynamic Source Routing","level":4,"score":0.45889851450920105},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.42990145087242126},{"id":"https://openalex.org/C2983435990","wikidata":"https://www.wikidata.org/wiki/Q22725","display_name":"Network routing","level":3,"score":0.4152452349662781}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icnss.2011.6060022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnss.2011.6060022","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 5th International Conference on Network and System Security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.294.6773","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.6773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://grothoff.org/christian/nss2011.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4099999964237213,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W50090895","https://openalex.org/W1572272766","https://openalex.org/W1600293573","https://openalex.org/W1996631135","https://openalex.org/W1997096104","https://openalex.org/W2042507951","https://openalex.org/W2101890615","https://openalex.org/W2104419537","https://openalex.org/W2119245106","https://openalex.org/W2124683839","https://openalex.org/W2140687139","https://openalex.org/W2144631484","https://openalex.org/W2147021670","https://openalex.org/W2148573461","https://openalex.org/W2153438992","https://openalex.org/W2155869384","https://openalex.org/W2162733677","https://openalex.org/W2163059190","https://openalex.org/W2471517265","https://openalex.org/W3162105941","https://openalex.org/W4240443285","https://openalex.org/W4285719527","https://openalex.org/W6602048372","https://openalex.org/W6677516953","https://openalex.org/W6681303621","https://openalex.org/W6683783481","https://openalex.org/W6983472706"],"related_works":["https://openalex.org/W1997091564","https://openalex.org/W2102655743","https://openalex.org/W2607223747","https://openalex.org/W2081964190","https://openalex.org/W2152381136","https://openalex.org/W2117123509","https://openalex.org/W2911943936","https://openalex.org/W2012247215","https://openalex.org/W146128134","https://openalex.org/W2170921015"],"abstract_inverted_index":{"This":[0],"paper":[1],"describes":[2],"a":[3,16],"new":[4],"secure":[5],"DHT":[6],"routing":[7,26],"algorithm":[8,27,47],"for":[9],"open,":[10],"decentralized":[11],"P2P":[12],"networks":[13],"operating":[14],"in":[15,37],"restricted-route":[17],"environment":[18],"with":[19],"malicious":[20,41],"participants.":[21],"We":[22],"have":[23,29],"implemented":[24],"our":[25,46],"and":[28,36],"evaluated":[30],"its":[31],"performance":[32,51],"under":[33],"various":[34],"topologies":[35],"the":[38],"presence":[39],"of":[40],"peers.":[42],"For":[43],"small-world":[44],"topologies,":[45],"provides":[48],"significantly":[49],"better":[50],"when":[52],"compared":[53],"to":[54],"existing":[55],"methods.":[56]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
