{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:14:01Z","timestamp":1775913241775,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540417248","type":"print"},{"value":"9783540447023","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44702-4_4","type":"book-chapter","created":{"date-parts":[[2007,6,18]],"date-time":"2007-06-18T05:53:56Z","timestamp":1182146036000},"page":"46-66","source":"Crossref","is-referenced-by-count":652,"title":["Freenet: A Distributed Anonymous Information Storage and Retrieval System"],"prefix":"10.1007","author":[{"given":"Ian","family":"Clarke","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oskar","family":"Sandberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Brandon","family":"Wiley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Theodore W.","family":"Hong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,3,16]]},"reference":[{"key":"4_CR1","unstructured":"S. Adler, \u201cThe Slashdot effect: an analysis of three Internet publications,\u201d Linux Gazette issue 38, March 1999."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R. Albert","year":"2000","unstructured":"R. Albert, H. Jeong, and A. Barab\u00e1si, \u201cError and attack tolerance of complex networks,\u201d Nature\n                           406, 378\u2013382 (2000).","journal-title":"Nature"},{"key":"4_CR3","unstructured":"American National Standards Institute, American National Standard X9.30.2-1997: Public Key Cryptography for the Financial Services Industry-Part 2: The Secure Hash Algorithm (SHA-1) (1997)."},{"key":"4_CR4","unstructured":"R. J. Anderson, \u201cThe Eternity service,\u201d in Proceedings of the 1st International Conference on the Theory and Applications of Cryptology (PRAGOCRYPT\u2019 96), Prague, Czech Republic (1996)."},{"key":"4_CR5","volume-title":"Proceedings of the Workshop on Design Issues in Anonymity and Unobservability","author":"O. Berthold","year":"2001","unstructured":"O. Berthold, H. Federrath, and S. K\u00f6psell, \u201cWeb MIXes: a system for anonymous and unobservable Internet access,\u201d in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer: New York (2001)."},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. L. Chaum","year":"1981","unstructured":"D. L. Chaum, \u201cUntraceable electronic mail, return addresses, and digital pseudonyms,\u201d Communications of the ACM\n                           24(2), 84\u201388(1981).","journal-title":"Communications of the ACM"},{"key":"4_CR7","volume-title":"Proceedings of the Fourth ACM Conference on Digital Libraries (DL\u2019 99)","author":"Y. Chen","year":"1999","unstructured":"Y. Chen, J. Edler, A. Goldberg, A. Gottlieb, S. Sobti, and P. Yianilos, \u201cA proto-type implementation of archival intermemory,\u201d in Proceedings of the Fourth ACM Conference on Digital Libraries (DL\u2019 99), Berkeley, CA, USA. ACM Press: New York (1999)."},{"issue":"6","key":"4_CR8","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, \u201cPrivate information retrieval,\u201d Journal of the ACM\n                           45(6), 965\u2013982 (1998).","journal-title":"Journal of the ACM"},{"key":"4_CR9","unstructured":"I. Clarke, \u201cA distributed decentralised information storage and retrieval system,\u201d unpublished report, Division of Informatics, University of Edinburgh (1999). Available at \n                    http:\/\/www.freenetproject.org\/\n                    \n                   (2000)."},{"key":"4_CR10","unstructured":"L. Cottrell, \u201cFrequently asked questions about Mixmaster remailers,\u201d \n                    http:\/\/www.obscura.com\/~loki\/remailer\/mixmaster-faq.html\n                    \n                   (2000)."},{"key":"4_CR11","volume-title":"Proceedings of the Workshop on Design Issues in Anonymity and Unobservability","author":"R. Dingledine","year":"2001","unstructured":"R. Dingledine, M. J. Freedman, and D. Molnar, \u201cThe Free Haven project: distributed anonymous storage service,\u201d in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer: New York(2001)."},{"key":"4_CR12","unstructured":"D. J. Ellard, J. M. Megquier, and L. Park, \u201cThe INDIA protocol,\u201d \n                    http:\/\/www.eecs.harvard.edu\/~ellard\/India-WWW\/\n                    \n                   (2000)."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"I. Goldberg and D. Wagner, \u201cTAZ servers and the rewebber network: enabling anonymous publishing on the world wide web,\u201d First Monday\n                           3(4) (1998).","DOI":"10.5210\/fm.v3i4.586"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"D. Goldschlag, M. Reed, and P. Syverson, \u201cOnion routing for anonymous and private Internet connections,\u201d Communications of the ACM\n                           42(2), 39\u201341 (1999).","journal-title":"Communications of the ACM"},{"key":"4_CR15","volume-title":"Peer-to-Peer","author":"T. Hong","year":"2001","unstructured":"T. Hong, \u201cPerformance,\u201d in Peer-to-Peer, ed. by A. Oram. O\u2019Reilly: Sebastopol, CA, USA (2001)."},{"key":"4_CR16","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1038\/43604","volume":"401","author":"B. A. Huberman","year":"1999","unstructured":"B. A. Huberman and L. A. Adamic, \u201cInternet: growth dynamics of the world-wide web,\u201d Nature\n                           401, 131 (1999).","journal-title":"Nature"},{"issue":"1","key":"4_CR17","first-page":"60","volume":"1","author":"S. Milgram","year":"1967","unstructured":"S. Milgram, \u201cThe small world problem,\u201d Psychology Today\n                           1(1), 60\u201367 (1967).","journal-title":"Psychology Today"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M. K. Reiter","year":"1999","unstructured":"M. K. Reiter and A. D. Rubin, \u201cAnonymous web transactions with Crowds,\u201d Communications of the ACM\n                           42(2), 32\u201338 (1999).","journal-title":"Communications of the ACM"},{"key":"4_CR19","unstructured":"M. Richtel and S. Robinson, \u201cSeveral web sites are attacked on day after assault shut Yahoo,\u201d The New York Times, February 9, 2000."},{"key":"4_CR20","unstructured":"J. Rosen, \u201cThe eroded self,\u201d The New York Times, April 30, 2000."},{"key":"4_CR21","unstructured":"A. S. Tanenbaum, Modern Operating Systems. Prentice-Hall: Upper Saddle River, NJ, USA (1992)."},{"key":"4_CR22","unstructured":"M. Waldman, A. D. Rubin, and L. F. Cranor, \u201cPublius: a robust, tamper-evident, censorship-resistant, web publishing system,\u201d in Proceedings of the Ninth USENIX Security Symposium, Denver, CO, USA (2000)."},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D. Watts","year":"1998","unstructured":"D. Watts and S. Strogatz, \u201cCollective dynamics of\u2019 small-world\u2019 networks,\u201d Nature\n                           393, 440\u2013442 (1998).","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Designing Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44702-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T05:36:21Z","timestamp":1550381781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44702-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540417248","9783540447023"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-44702-4_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}