{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:02:12Z","timestamp":1725552132542},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308492"},{"type":"electronic","value":"9783540322986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11599371_22","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T09:56:37Z","timestamp":1132739797000},"page":"261-273","source":"Crossref","is-referenced-by-count":3,"title":["Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring"],"prefix":"10.1007","author":[{"given":"Lasse","family":"\u00d8verlier","sequence":"first","affiliation":[]},{"given":"T\u00f8nnes","family":"Brekne","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"\u00c5rnes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Koehntopp, M.: Anonymity, unobservability, and pseudonymity \u2013 a proposal for terminology. In: Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.1007\/3-540-44702-4_1"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11767831_12","volume-title":"Privacy Enhancing Technologies","author":"T. Brekne","year":"2006","unstructured":"Brekne, T., \u00c5rnes, A., \u00d8sleb\u00f8, A.: Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 179\u2013196. Springer, Heidelberg (2006)"},{"key":"22_CR3","unstructured":"Brekne, T., \u00c5rnes, A.: Circumventing ip-address pseudonymization in o(n 2) time. In: Proceedings of IASTED Communication and Computer Networks, CCN 2005 (2005)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 93. Springer, Heidelberg (2001)"},{"key":"22_CR5","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04 (1981)","DOI":"10.1145\/358549.358563"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology\u00a01, 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J.F. Raymond","year":"2001","unstructured":"Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 10. Springer, Heidelberg (2001)"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-44702-4_10","volume-title":"Designing Privacy Enhancing Technologies","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Flegel, U.: On pseudonymization of audit data for intrusion detection. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 161. Springer, Heidelberg (2001)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Sobirey, M., Fischer-H\u00fcbner, S., Rannenberg, K.: Pseudonymous audit for privacy enhanced intrusion detection. In: SEC, pp. 151\u2013163 (1997)","DOI":"10.1007\/978-0-387-35259-6_13"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Xu, J., Fan, J., Ammar, M., Moon, S.B.: On the design and performance of prefix-preserving ip traffic trace anonymization. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop 2001 (2001)","DOI":"10.1145\/505202.505234"},{"key":"22_CR12","unstructured":"Xu, J., Fan, J., Ammar, M., Moon, S.B.: Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In: ICNP 2002 (2002)"},{"key":"22_CR13","unstructured":"Ramaswamy, R., Weng, N., Wolf, T.: An IXA-basednetwork measurement node. In: Proc. of Intel IXA University Summit (2004)"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1145\/863955.863994","volume-title":"SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications","author":"R. Pang","year":"2003","unstructured":"Pang, R., Paxson, V.: A high-level programming environment for packet trace anonymization and transformation. In: SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 339\u2013351. ACM Press, New York (2003)"},{"key":"22_CR15","unstructured":"Stadler, M.: Cryptographic Protocols for Revocable Privacy. PhD thesis (1996)"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-46513-8_14","volume-title":"Selected Areas in Cryptography","author":"A. Lysyanskaya","year":"2000","unstructured":"Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol.\u00a01758, p. 184. Springer, Heidelberg (2000)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-27809-2_21","volume-title":"Financial Cryptography","author":"G. Persiano","year":"2004","unstructured":"Persiano, G., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 196\u2013211. Springer, Heidelberg (2004)"},{"key":"22_CR18","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., Chichester (1996)"},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1109\/PROC.1979.11256","volume":"67","author":"W. Diffie","year":"1979","unstructured":"Diffie, W., Hellman, M.E.: Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE\u00a067, 297\u2013427 (1979)","journal-title":"Proceedings of the IEEE"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11599371_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:58:15Z","timestamp":1619506695000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11599371_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308492","9783540322986"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11599371_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}