{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:50:44Z","timestamp":1742399444106},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_11","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"190-207","source":"Crossref","is-referenced-by-count":8,"title":["Improving Sender Anonymity in a Structured Overlay with Imprecise Routing"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Ciaccio","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Aspnes, J., Shah, G.: Skip Graphs. In: Proc. of the 14th Annual ACM-SIAM Symp. on Discrete Algorithms (SODA 2003) (January 2003)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_10","volume-title":"Privacy Enhancing Technologies","author":"K. Bennett","year":"2003","unstructured":"Bennett, K., Grothoff, C.: GAP: Practical Anonymous Networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, Springer, Heidelberg (2003)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-45450-0_8","volume-title":"Information Security and Privacy","author":"K. Bennett","year":"2002","unstructured":"Bennett, K., Grothoff, C., Horozov, T., Patrascu, I.: Efficient Sharing of Encrypted Data. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 107\u2013120. Springer, Heidelberg (2002)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Proc. of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (PET)","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"11_CR5","unstructured":"Borisov, N., Waddle, J.: Anonymity in Structured Peer-to-Peer Networks (December 2003), gnunet.org\/papers\/borisov_waddle.pdf"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Castro, M., Druschel, P., Kermarrec, A.M., Rowstron, A.: Scribe: A Large-scale and Decentralized Application-level Multicast Infrastructure. IEEE Journal on Selected Areas in Communications, special issue on Network Support for Multicast Communications\u00a020(8) (October 2002)","DOI":"10.1109\/JSAC.2002.803069"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a02 (February 1981)","DOI":"10.1145\/358549.358563"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology\u00a01(1), 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"11_CR9","unstructured":"Ciaccio, G.: The NEBLO homepage, http:\/\/www.disi.unige.it\/project\/neblo\/"},{"key":"11_CR10","volume-title":"Proc. of the International Conference on Internet and Web Applications and Services (ICIW 2006)","author":"G. Ciaccio","year":"2006","unstructured":"Ciaccio, G.: Recipient Anonymity in a Structured Overlay. In: Proc. of the International Conference on Internet and Web Applications and Services (ICIW 2006), Guadeloupe, French Caribbean, February 2006, IEEE, Los Alamitos (2006)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proc. of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (PET), July 2000, pp. 46\u201366 (2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_15","volume-title":"Peer-to-Peer Systems","author":"R. Cox","year":"2002","unstructured":"Cox, R., Muthitacharoen, A., Morris, R.: Serving DNS using a Peer-to-Peer Lookup Service. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, Springer, Heidelberg (2002)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Wide-area Cooperative Storage with CFS. In: Proc. of 18th ACM Symp. on Operating Systems Principles (October 2001)","DOI":"10.1145\/502034.502054"},{"key":"11_CR14","unstructured":"Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M.F., Morris, R.: Designing a DHT for low latency and high throughput. In: Proc. of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI 2004), San Francisco, CA (March 2004)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, Springer, Heidelberg (2003)"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_5","volume-title":"Designing Privacy Enhancing Technologies","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven Project: Distributed Anonymous Storage Service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, Springer, Heidelberg (2001)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_25","volume-title":"Peer-to-Peer Systems II","author":"J. Eriksson","year":"2003","unstructured":"Eriksson, J., Faloutsos, M., Krishnamurthy, S.: PeerNet: Pushing Peer-to-Peer Down the Stack. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, Springer, Heidelberg (2003)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Kubiatowicz, J., et al.: Oceanstore: An Architecture for Global-scale Persistent Storage. In: Proc. of ACM ASPLOS (November 2000)","DOI":"10.1145\/378993.379239"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC (November 2002)","DOI":"10.1145\/586110.586137"},{"key":"11_CR20","unstructured":"Goldberg, I.: A Pseudonymous Communications Infrastructure for the Internet. PhD thesis, UC Berkeley (December 2000)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Gummadi, K., Gummadi, R., Gribble, S., Ratnasamy, S., Shenker, S., Stoica, I.: The Impact of DHT Routing Geometry on Resilience and Proximity. In: Proc. of ACM SIGCOMM (August 2003)","DOI":"10.1145\/863955.863998"},{"key":"11_CR22","unstructured":"Gupta, A., Liskov, B., Rodrigues, R.: One Hop Lookups for Peer-to-peer Overlays. In: Proc. of the 9th Workshop on Hot Topics in Operating Systems (HotOS-IX), Lihue, Hawaii (May 2003)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_15","volume-title":"Peer-to-Peer Systems II","author":"I. Gupta","year":"2003","unstructured":"Gupta, I., Birman, K., Linga, P., Demers, A., van Renesse, R.: Kelips: Building an Efficient and Stable P2P DHT Through Increased Memory and Background Overhead. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, Springer, Heidelberg (2003)"},{"key":"11_CR24","unstructured":"Harvey, N., Jones, M.B., Saroiu, S., Theimer, M., Wolman, A.: Skipnet: A Scalable Overlay Network with Practical Locality Properties. In: Proc. of the 4th USENIX Symposium on Internet Technologies and Systems (USITS 20) (March 2003)"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","volume-title":"Peer-to-Peer Systems","author":"S. Hazel","year":"2002","unstructured":"Hazel, S., Wiley, B.: Achord: A Variant of the Chord Lookup Service for Use in Censorship Resistant Peer-to-Peer Publishing Systems. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, Springer, Heidelberg (2002)"},{"key":"11_CR26","unstructured":"Kannan, J., Bansal, M.: Anonymity in Chord (December 2002), http:\/\/www.cs.berkeley.edu\/kjk\/chord-anon.ps"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Leong, B., Li, J.: Achieving One-Hop DHT Lookup and Strong Stabilization by Passing Tokens. In: Proc. of the 12th International Conference on Networks (ICON) (November 2004)","DOI":"10.1109\/ICON.2004.1409167"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: A Scalable and Dynamic Emulation of the Butterfly. In: Proc. of ACM PODC (August 2002)","DOI":"10.1145\/571825.571857"},{"key":"11_CR29","unstructured":"Manku, G.S., Bawa, M., Raghavan, P.: Symphony: Distributed Hashing in a Small World. In: Proc. of the fourth USENIX Symposium on Internet Technologies and Systems (USITS 2003), Seattle, WA (March 2003)"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P. Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A Peer-to-peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, Springer, Heidelberg (2002)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Mislove, A., Oberoi, G., Post, A., Reis, C., Druschel, P., Wallach, D.S.: AP3: Cooperative, Decentralized Anonymous Communication. In: Proc. of 11th ACM SIGOPS European Workshop, Leuven, Belgium (September 2004)","DOI":"10.1145\/1133572.1133578"},{"key":"11_CR32","unstructured":"O\u2019Donnell, C., Vaikuntanathan, V.: Information Leak in the Chord Lookup Protocol. In: Proc. of the 4th IEEE Int.l Conf. on Peer-to-Peer Computing (P2P 2004), Zurich, Switzerland (August 2004)"},{"key":"11_CR33","unstructured":"Perlegos, P.: DoS Defense in Structured Peer-to-Peer Networks. Technical Report UCB-CSD-04-1309, U.C. Berkeley (March 2004)"},{"issue":"6","key":"11_CR34","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1145\/78973.78977","volume":"33","author":"W. Pugh","year":"1990","unstructured":"Pugh, W.: Skip Lists: a Probabilistic Alternative to Balanced Trees. Comm. of ACM\u00a033(6), 668\u2013676 (1990)","journal-title":"Comm. of ACM"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. of ACM SIGCOMM (August 2001)","DOI":"10.1145\/383059.383072"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Handley, M., Karp, R., Shenker, S.: Application-level Multicast Using Content-addressable Networks. In: Proc. of 3rd Int.l Workshop on Networked Group Communication (November 2001)","DOI":"10.1007\/3-540-45546-9_2"},{"key":"11_CR37","unstructured":"Rohrer, J.: MUTE: Simple, Anonymous File Sharing, http:\/\/mute-net.sourceforge.net\/"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-peer Systems. In: Proc. of Int.l Conf. on Distributed System Platforms (November 2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Storage Management and Caching in PAST, a Large-scale, Persistent Peer-to-peer Storage Utility. In: Proc. of 18th ACM Symp. on Operating Systems Principles (October 2001)","DOI":"10.1145\/502034.502053"},{"key":"11_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_11","volume-title":"Peer-to-Peer Systems","author":"A. Serjantov","year":"2002","unstructured":"Serjantov, A.: Anonymizing Censorship Resistant Systems. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, Springer, Heidelberg (2002)"},{"key":"11_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, Springer, Heidelberg (2003)"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A protocol for scalable anonymous communication. In: Proc. of the 2002 IEEE Symposium on Security and Privacy (May 2002)","DOI":"10.1109\/SECPRI.2002.1004362"},{"key":"11_CR43","unstructured":"Singh, A., Liu, L.: Agyaat: Providing Mutually Anonymous Services over Structured P2P Networks. Technical Report GIT-CERCS-04-12, Georgia Inst. of Tech. CERCS (2004)"},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Stoica, I., Adkins, D., Zhuang, S., Shenker, S., Surana, S.: Internet Indirection Infrastructure. In: Proc. of ACM SIGCOMM (August 2002)","DOI":"10.1145\/633025.633033"},{"key":"11_CR45","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a Scalable Peer-to-peer Lookup Service for Internet Applications. In: Proc. of ACM SIGCOMM (August 2001)","DOI":"10.1145\/383059.383071"},{"key":"11_CR46","unstructured":"Waldman, M., Rubin, A., Cranor, L.: Publius: A Robust, Tamper-evident, Censorship-resistant and Source-anonymous Web Publishing System. In: Proc. of the 9th USENIX Security Symposium, August 2000, pp. 59\u201372 (2000)"},{"key":"11_CR47","doi-asserted-by":"crossref","unstructured":"Wang, J., Lu, L., Chien, A.: Tolerating Denial-of-Service Attacks Using Overlay Networks - Impact of Topology. In: Proc. of ACM Workshop on Survivable and Self-Regenerative Systems (October 2003)","DOI":"10.1145\/1036921.1036926"},{"key":"11_CR48","unstructured":"Zhao, B.Y., Kubiatowicz, J.D., Joseph, A.D.: Tapestry: An Infrastructure for Fault-resilient Wide-area Location and Routing. Technical Report UCB-CSD-01-1141, U.C. Berkeley (April 2001)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:33Z","timestamp":1619508093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/11957454_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}