{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:08:35Z","timestamp":1761620915464},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290391"},{"type":"electronic","value":"9783540314813"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11558859_6","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T09:59:13Z","timestamp":1132739953000},"page":"62-76","source":"Crossref","is-referenced-by-count":11,"title":["Censorship Resistance Revisited"],"prefix":"10.1007","author":[{"given":"Ginger","family":"Perng","sequence":"first","affiliation":[]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Adar, E., Huberman, B.A.: Free Riding on Gnutella. First Monday, 5(10) (October 2004)","DOI":"10.5210\/fm.v5i10.792"},{"key":"6_CR2","unstructured":"Anderson, R.J.: The Eternity Service. Pragocrypt (1996)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-540-30108-0_11","volume-title":"Computer Security \u2013 ESORICS 2004","author":"J. Aspnes","year":"2004","unstructured":"Aspnes, J., Feigenbaum, J., Yampolskiy, A., Zhong, S.: Towards a Theory of Data Entanglement. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 177\u2013192. Springer, Heidelberg (2004)"},{"key":"6_CR4","first-page":"51","volume":"7","author":"A. Back","year":"1997","unstructured":"Back, A.: The eternity service. Phrack Magazine\u00a07, 51 (1997), http:\/\/www.cypherspace.org\/~adam\/eternity\/phrack.html","journal-title":"Phrack Magazine"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/3-540-45496-9_16","volume-title":"Information Hiding","author":"T. Benes","year":"2001","unstructured":"Benes, T.: The strong eternity service. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, p. 215. Springer, Heidelberg (2001)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-48910-X_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"C. Cachin","year":"1999","unstructured":"Cachin, C., Micali, S., Stadler, M.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, p. 402. Springer, Heidelberg (1999)"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Chor, B., Gilboa, N.: Computationally Private Information Retrieval. In: Symposium on Theory of Computing (1997)","DOI":"10.1145\/258533.258609"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Cooper, D.A., Birman, K.P.: Preserving Privacy in a Network of Mobile Computers. In: IEEE Symposium on Security and Privacy (1995)","DOI":"10.1109\/SECPRI.1995.398920"},{"key":"6_CR11","unstructured":"Danezis, G., Anderson, R.: The Economics of Censorship Resistance. In: Workshop on Economics and Information Security (2004)"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-44702-4_5","volume-title":"Designing Privacy Enhancing Technologies","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven project: distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 67. Springer, Heidelberg (2001)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network. In: ACM Conference on Computer and Communications Security (2002)","DOI":"10.1145\/586110.586137"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM\u00a042(2), 39\u201341 (1999)","journal-title":"Communications of the ACM"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Karger, D., Lehman, E., Leighton, T., Levine, M., Lewin, D., Panigraphy, R.: Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots. In: ACM Symposium on Theory of Computing (1997)","DOI":"10.1145\/258533.258660"},{"key":"6_CR16","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval. In: IEEE 38th Annual Symposium on Foundations of Computer Science (1997)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-27809-2_25","volume-title":"Financial Cryptography","author":"B.N. Levine","year":"2004","unstructured":"Levine, B.N., Reiter, M.K., Wang, C., Wright, M.: Timing Attacks in Low-Latency Mix Systems. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 251\u2013265. Springer, Heidelberg (2004)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Mazieres, D., Kaashoek, M.F.: The Design and Operation of an E-mail Pseudonym Server. In: ACM Conference on Computer and Communications Security (1998)","DOI":"10.1145\/288090.288098"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.1007\/3-540-44702-4_2"},{"key":"6_CR20","unstructured":"Reed, M.G., Syverson, P.F., GoldSchlag, D.M.: Proxies for anonymous routing. In: 12th Annual Computer Security Applications Conference (1996)"},{"issue":"1","key":"6_CR21","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-45748-8_11","volume-title":"Peer-to-Peer Systems","author":"A. Serjantov","year":"2002","unstructured":"Serjantov, A.: Anonymizing censorship resistant systems. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 111. Springer, Heidelberg (2002)"},{"issue":"11","key":"6_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"6_CR24","unstructured":"Stubblefield, A., Wallach, D.S.: Dagster: Censorship-Resistant Publishing Without Replication. Technical Report TR01-380. Rice University (July 2001)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.21236\/ADA465255"},{"key":"6_CR26","unstructured":"Gnutella, http:\/\/gnutella.wego.com"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Waldman, M., Mazieres, D.: Tangler: A Censorship Resistant Publishing System Based on Document Entanglement. In: ACM Conference on Computer and Communication Security (2001)","DOI":"10.1145\/501983.502002"},{"key":"6_CR28","unstructured":"Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant web publishing system. In: USENIX Security Symposium (2000)"},{"key":"6_CR29","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: An Analysis of the Degradation of Anonymous Protocols. In: ISOC Network and Distributed Security Symposium (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11558859_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:10:25Z","timestamp":1619507425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11558859_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290391","9783540314813"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/11558859_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}