{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:35:56Z","timestamp":1742398556844},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_13","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"223-244","source":"Crossref","is-referenced-by-count":14,"title":["Valet Services: Improving Hidden Servers with a Personal Touch"],"prefix":"10.1007","author":[{"given":"Lasse","family":"\u00d8verlier","sequence":"first","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Anderson, R.J.: The eternity service. In: Proceedings of Pragocrypt 1996 (1996)"},{"key":"13_CR2","unstructured":"The Anonymizer, http:\/\/www.anonymizer.com\/"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_10","volume-title":"Privacy Enhancing Technologies","author":"K. Bennett","year":"2003","unstructured":"Bennett, K., Grothoff, C.: GAP \u2013 practical anonymous networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, Springer, Heidelberg (2003)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"13_CR5","unstructured":"Borisov, N.: Anonymous Routing in Structured Peer-to-Peer Overlays. PhD thesis, UC Berkeley (Spring 2005)"},{"key":"13_CR6","unstructured":"Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture. In: White paper, Zero Knowledge Systems, Inc. (December 2000)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2) (February 1981)","DOI":"10.1145\/358549.358563"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, July 2000, pp. 46\u201366 (2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_18","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G. Danezis","year":"2005","unstructured":"Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil-resistant dht routing. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, Springer, Heidelberg (2005)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_5","volume-title":"Designing Privacy Enhancing Technologies","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Molnar, D.: The Free Haven Project: Distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, Springer, Heidelberg (2001)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext transfer protocol \u2013 http\/1.1. IETF RFC 2616 (June 1999)","DOI":"10.17487\/rfc2616"},{"key":"13_CR13","unstructured":"Goldberg, I.: A Pseudonymous Communications Infrastructure for the Internet. PhD thesis, UC Berkeley (December 2000)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D.M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"key":"13_CR15","unstructured":"Rubin, A.D., Waldman, M., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In: Proceedings of the 9th USENIX Security Symposium, August 2000, pp. 59\u201372 (2000)"},{"key":"13_CR16","volume-title":"Proceedings of the 2005 IEEE Symposium on Security and Privacy","author":"S.J. Murdoch","year":"2005","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005, IEEE CS, Los Alamitos (2005)"},{"key":"13_CR17","volume-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy","author":"L. \u00d8verlier","year":"2006","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE CS, Los Alamitos (2006)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: Untraceable communication with very small bandwidth overhead. In: Proceedings of the GI\/ITG Conference on Communication in Distributed Systems, February 1991, pp. 451\u2013463 (1991)","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"13_CR19","unstructured":"Proxify.com, http:\/\/www.proxify.com\/"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/383059.383072","volume-title":"SIGCOMM 2001: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications","author":"S. Ratnasamy","year":"2001","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: SIGCOMM 2001: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 161\u2013172. ACM Press, New York (2001)"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J.-F. Raymond","year":"2001","unstructured":"Raymond, J.-F.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 10\u201329. Springer, Heidelberg (2001)"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security\u00a01(1) (June 1998)","DOI":"10.1145\/290163.290168"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware), November 2001, pp. 329\u2013350 (2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security \u2013 ESORICS 2003","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, Springer, Heidelberg (2003)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/1102120.1102153","volume-title":"CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security","author":"A. Stavrou","year":"2005","unstructured":"Stavrou, A., Keromytis, A.D.: Countering DoS attacks with stateless multipath overlays. In: CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security, pp. 249\u2013259. ACM Press, New York (2005)"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/383059.383071","volume-title":"SIGCOMM 2001: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: SIGCOMM 2001: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 149\u2013160. ACM Press, New York (2001)"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Waldman, M., Mazi\u00e8res, D.: Tangler: a censorship-resistant publishing system based on document entanglements. In: Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), November 2001, pp. 126\u2013135 (2001)","DOI":"10.1145\/501983.502002"},{"key":"13_CR28","volume-title":"Proceedings of the Network and Distributed Security Symposium - NDSS 2002","author":"M. Wright","year":"2002","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Proceedings of the Network and Distributed Security Symposium - NDSS 2002, IEEE, Los Alamitos (2002)"},{"issue":"4","key":"13_CR29","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1145\/1042031.1042032","volume":"7","author":"M.K. Wright","year":"2004","unstructured":"Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur.\u00a07(4), 489\u2013522 (2004); A preliminary version of this paper appeared in [28]","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"13_CR30","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/JSAC.2003.818784","volume":"22","author":"B.Y. Zhao","year":"2004","unstructured":"Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications\u00a022(1), 41\u201353 (2004)","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:34Z","timestamp":1619508094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11957454_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}