{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:29:46Z","timestamp":1725467386179},"publisher-location":"Boston","reference-count":11,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402077769"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-23484-5_7","type":"book-chapter","created":{"date-parts":[[2006,7,17]],"date-time":"2006-07-17T09:56:37Z","timestamp":1153130197000},"page":"71-82","source":"Crossref","is-referenced-by-count":2,"title":["VAST: Versatile Anonymous System for Web Users"],"prefix":"10.1007","author":[{"given":"Igor","family":"Margasi\u0144ski","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Szczypiorski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Frystyk, H. Hypertext Transfer Protocol \u2014 HTTP\/1.0. RFC 1945, 1996.","DOI":"10.17487\/rfc1945"},{"issue":"2","key":"7_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM Vol. 24 no 2, 1981, pp. 84\u201388.","journal-title":"Communications of the ACM"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Dierks T., Allen C. The TLS-Protocol Version 1.0. RFC 2246, 1999.","DOI":"10.17487\/rfc2246"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee T. HyperText Transfer Protocol \u2014 HTTP\/1.1. RFC 2616, 1999.","DOI":"10.17487\/rfc2616"},{"key":"7_CR5","unstructured":"Goldberg, I., Shostack, A. Freedom Network 1.0 Architecture and Protocols. Zero-Knowledge Systems. White Paper, 1999."},{"issue":"2","key":"7_CR6","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. M. Goldschlag","year":"1999","unstructured":"Goldschlag, D. M., Reed, M. G., Syverson, P. F. Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM Vol. 42 no 2, 1999, 39\u201341.","journal-title":"Communications of the ACM"},{"key":"7_CR7","unstructured":"Krane, D., Light, L., Gravitch D. Privacy On and Off the Internet: What Consumers Want. Harris Interactive, 2002."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Kristol, R., Montulli, L. HTTP State Management Mechanism. RFC 2965, 2000.","DOI":"10.17487\/rfc2965"},{"key":"7_CR9","unstructured":"Martin, D., Schulman, A. Deanonymizing Users of the SafeWeb Anonymizing Service. Privacy Foundation, Boston University, 2002."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Rubin, A.D. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, 1998, pp. 66\u201392","DOI":"10.1145\/290163.290168"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Syverson, P. F., Goldschlag, D. M., Reed, M. G. Anonymous Connections and Onion Routing. IEEE Symposium on Security and Privacy, 1997.","DOI":"10.1109\/SECPRI.1997.601314"}],"container-title":["Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-23484-5_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T04:43:14Z","timestamp":1619498594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-23484-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402077769"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/0-387-23484-5_7","relation":{},"subject":[]}}