{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:39Z","timestamp":1725558999172},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262039"},{"type":"electronic","value":"9783540319603"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11423409_12","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T18:30:11Z","timestamp":1278527411000},"page":"186-206","source":"Crossref","is-referenced-by-count":28,"title":["Synchronous Batching: From Cascades to Free Routes"],"prefix":"10.1007","author":[{"given":"Roger","family":"Dingledine","sequence":"first","affiliation":[]},{"given":"Vitaly","family":"Shmatikov","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-36467-6_9","volume-title":"Privacy Enhancing Technologies","author":"O. Berthold","year":"2003","unstructured":"Berthold, O., Langos, H.: Dummy traffic against long term intersection attacks. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 110\u2013128. Springer, Heidelberg (2003)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-44702-4_3","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 30. Springer, Heidelberg (2001)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudo-nyms. Communications of the ACM\u00a04(2) (February 1982)","DOI":"10.1145\/358549.358563"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology:Proceedings of Crypto 1982, pp. 199\u2013203. Plenum Press, New York (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-40956-4_1","volume-title":"Privacy Enhancing Technologies","author":"G. Danezis","year":"2003","unstructured":"Danezis, G.: Mix-networks with restricted routes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 1\u201317. Springer, Heidelberg (2003)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC2003), Athens, pp. 421\u2013426. IFIP TC11, Kluwer (2003)","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"12_CR8","first-page":"2","volume-title":"2003 IEEE Symposium on Security and Privacy","author":"G. Danezis","year":"2003","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a type III anonymous remailer protocol. In: 2003 IEEE Symposium on Security and Privacy, pp. 2\u201315. IEEE CS, Los Alamitos (2003)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Danezis, G., Sassaman, L.: Heartbeat traffic to counter (n-1) attacks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA (October 2003)","DOI":"10.1145\/1005140.1005154"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-45496-9_10","volume-title":"Information Hiding","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A Reputation System to Increase MIX-net Reliability. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 126\u2013141. Springer, Heidelberg (2001)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Syverson, P.: Reliable MIX Cascade Networks through Reputation. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-36504-4_18"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J. Douceur","year":"2002","unstructured":"Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"12_CR14","unstructured":"Kwiatkowska, M., et al.: PRISM, http:\/\/www.cs.bham.ac.uk\/~dxp\/prism\/"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/BFb0053726","volume-title":"Information Security and Privacy","author":"E. Franz","year":"1998","unstructured":"Franz, E., Graubner, A., Jerichow, A., Pfitzmann, A.: Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, p. 111. Springer, Heidelberg (1998)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D.M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/NDSS.1996.492350","volume-title":"Network and Distributed Security Symposium (NDSS 1996)","author":"C. G\u00fclc\u00fc","year":"1996","unstructured":"G\u00fclc\u00fc, C., Tsudik, G.: Mixing E-mail with Babel. In: Network and Distributed Security Symposium (NDSS 1996), pp. 2\u201316. IEEE, Los Alamitos (1996)"},{"key":"12_CR18","volume-title":"Principles of Distributed Computing - PODC 1999","author":"M. Jakobsson","year":"1999","unstructured":"Jakobsson, M.: Flash Mixing. In: Principles of Distributed Computing - PODC 1999. ACM Press, New York (1999)"},{"key":"12_CR19","unstructured":"Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Proceedings of the 11th USENIX Security Symposium (August 2002)"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information Hiding","author":"D. Kesdogan","year":"1998","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, p. 83. Springer, Heidelberg (1998)"},{"key":"12_CR21","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol \u2014 Version 2. Draft (July 2003), http:\/\/www.abditum.com\/mixmaster-spec.txt"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-39805-8_29","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"A. Pfitzmann","year":"1986","unstructured":"Pfitzmann, A., Waidner, M.: Networks without user observability \u2013 design options. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 245\u2013253. Springer, Heidelberg (1986)"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"key":"12_CR25","unstructured":"Shmatikov, V.: Probabilistic model checking of an anonymity system. Journal of Computer Security (selected papers of CSFW-15) (2004) (to appear)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11423409_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:52:59Z","timestamp":1605642779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11423409_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262039","9783540319603"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11423409_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}