{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:57Z","timestamp":1725558957361},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262039"},{"type":"electronic","value":"9783540319603"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11423409_14","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T18:30:11Z","timestamp":1278527411000},"page":"226-241","source":"Crossref","is-referenced-by-count":13,"title":["Measuring Anonymity in a Non-adaptive, Real-Time System"],"prefix":"10.1007","author":[{"given":"Gergely","family":"T\u00f3th","sequence":"first","affiliation":[]},{"given":"Zolt\u00e1n","family":"Horn\u00e1k","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Reed, M., Syverson, P., Goldschlag, D.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 482\u2013494 (1998)","DOI":"10.21236\/ADA465335"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzman","year":"2001","unstructured":"Pfitzman, A., Kohntopp, M.: Anonymity, Unobservability, and Pseudonymity \u2013 A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-45496-9_18","volume-title":"Information Hiding","author":"A. Back","year":"2001","unstructured":"Back, A., M\u00f6ller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 245\u2013257. Springer, Heidelberg (2001)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39650-5_7","volume-title":"Computer Security \u2013 ESORICS 2003","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Sewell, P.: Passive Attack Analysis for Connection-Based Anonymity Systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 116\u2013131. Springer, Heidelberg (2003)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an Information Theoretic Metric for Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"issue":"1","key":"14_CR7","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Berthold, O., Federrath, H., K\u00f6hntopp, M.: Project \u201cAnonymity and Unobservability in the Internet\u201d. In: Conference on Freedom and Privacy 2000 (CFP 2000), Workshop on Freedom and Privacy by Design (2000)","DOI":"10.1145\/332186.332211"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-36467-6_9","volume-title":"Privacy Enhancing Technologies","author":"O. Berthold","year":"2003","unstructured":"Berthold, O., Langos, H.: Dummy traffic against long term intersection attacks. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 110\u2013128. Springer, Heidelberg (2003)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-40956-4_4","volume-title":"Privacy Enhancing Technologies","author":"R.E. Newman","year":"2003","unstructured":"Newman, R.E., Moskowitz, I.S., Syverson, P., Serjantov, A.: Metrics for Traffic Analysis Prevention. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 48\u201365. Springer, Heidelberg (2003)"},{"key":"14_CR12","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending Anonymous Communications Against Passive Logging Attacks. In: ISOC Symposium on Network and Distributed System Security (2002)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Rennhard, M., Plattner, B.: Introducing Morphmix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Workshop on Privacy and Electronic Society (WPES) (2002)","DOI":"10.1145\/644527.644537"},{"key":"14_CR14","unstructured":"Anonymizer.com\u2014Online Privacy Services, http:\/\/www.anonymizer.com"},{"key":"14_CR15","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol \u2014 Version 2. Draft (2002)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information Hiding","author":"D. Kesdogan","year":"1998","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop\u2013and\u2013Go MIXes: Providing Probabilistic Anonymity in an Open System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, p. 83. Springer, Heidelberg (1998)"},{"key":"14_CR17","unstructured":"Boucher, P., Shostack, A., Goldberg, I.: Freedom Systems 2.0 Architecture. White paper, Zero Knowledge Systems Inc. (2000)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11423409_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:52:59Z","timestamp":1605642779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11423409_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262039","9783540319603"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11423409_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}