{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:05:06Z","timestamp":1770217506501,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540418986","type":"print"},{"value":"9783540453536","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45353-9_30","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:50:02Z","timestamp":1184601002000},"page":"408-424","source":"Crossref","is-referenced-by-count":40,"title":["Targeted Advertising ... and Privacy Too"],"prefix":"10.1007","author":[{"given":"Ari","family":"Juels","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,4,2]]},"reference":[{"key":"30_CR1","unstructured":"Crowds homepage. AT&T Labs. http:\/\/www.research.att.com\/projects\/crowds ."},{"key":"30_CR2","unstructured":"Encirq, Inc. http:\/\/www.encirq.com ."},{"key":"30_CR3","unstructured":"Microsoft ActiveX resource page. Microsoft Corporation. http:\/\/www.microsoft.com\/com\/tech\/ActiveX.asp ."},{"key":"30_CR4","unstructured":"Platform for privacy preferences (P3P) project. World Wide Web Consortium (W3C). http:\/\/www.w3.org\/p3p ."},{"key":"30_CR5","unstructured":"Zero-Knowledge Systems, Inc. http:\/\/www.zeroknowledge.com ."},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"M. Abe. Universally verifiable mix-net with verification work independent of the number of mix-servers. In EUROCRYPT\u2019 98, pages 437\u2013447, 1998.","DOI":"10.1007\/BFb0054144"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"M. Abe. A mix-network on permutation networks. In ASIACRYPT\u2019 99, pages 258\u2013273, 1999.","DOI":"10.1007\/978-3-540-48000-6_21"},{"key":"30_CR8","unstructured":"Reuters News Agency. DoubleClick awaits FTC OK: CEO says Web adfirm will wait for privacy policy before it uses ad tracking. 2 March 2000."},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"R.M. Arlien, B. Jai, M. Jakobsson, F. Monrose, and M. K. Reiter. Privacy-preserving global customization. In ACM E-Commerce\u2019 00, 2000. To appear.","DOI":"10.1145\/352871.352891"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In EUROCRYPT\u2019 99, pages 402\u2013414, 1999.","DOI":"10.1007\/3-540-48910-X_28"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"J. Camenisch and M. Michels. Proving that a number is the product of two safe primes. In EUROCRYPT\u2019 99, pages 107\u2013122, 1999.","DOI":"10.1007\/3-540-48910-X_8"},{"issue":"2","key":"30_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84\u201388, 1981.","journal-title":"Communications of the ACM"},{"issue":"6","key":"30_CR13","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. JACM, 45(6):965\u2013981, 1998.","journal-title":"JACM"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Y. Desmedt and K. Kurosawa. How to break a practical mix and design a new one. In EUROCRYPT\u2019 00, pages 557\u2013572, 2000.","DOI":"10.1007\/3-540-45539-6_39"},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, (22):644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In EUROCRYPT\u2019 86, pages 186\u2013194, 1986.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31:469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Secure distributed key generation for d-log based cryptosystems. In EUROCRYPT\u2019 99, pages 295\u2013310, 1999.","DOI":"10.1007\/3-540-48910-X_21"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for PIR. In RANDOM\u2019 98, pages 200\u2013217, 1998.","DOI":"10.1007\/3-540-49543-6_17"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In STOC\u2019 98, pages 151\u2013160, 1998.","DOI":"10.1145\/276698.276723"},{"key":"30_CR21","unstructured":"J. Goldman, Z. Hudson, and R.M. Smith. Report on the privacy policies and practices of health Web sites, 2000."},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In STOC\u2019 87, pages 218\u2013229, 1987.","DOI":"10.1145\/28395.28420"},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"M. Jakobsson. A practical mix. In EUROCRYPT\u2019 98, pages 448\u2013461, 1998.","DOI":"10.1007\/BFb0054145"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"M. Jakobsson. Flash mixing. In PODC\u2019 99, pages 83\u201389, 1999.","DOI":"10.1145\/301308.301333"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"M. Jakobsson. On quorum controlled asymmetric proxy re-encryption. In PKC\u2019 99, pages 112\u2013121, 1999.","DOI":"10.1007\/3-540-49162-7_9"},{"key":"30_CR26","unstructured":"M. Jakobsson and A. Juels. Millimix: Mixing in small batches, 1999. DIMACS Technical Report 99-33."},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via cipher-texts. In ASIACRYPT\u2019 00, 2000. To appear.","DOI":"10.1007\/3-540-44448-3_13"},{"key":"30_CR28","doi-asserted-by":"crossref","unstructured":"E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In FOCS\u2019 97, pages 364\u2013373, 1997.","DOI":"10.1109\/SFCS.1997.646125"},{"key":"30_CR29","unstructured":"N. Lynch. Distributed Algorithms. Morgan Kaufmann, 1995."},{"key":"30_CR30","doi-asserted-by":"crossref","unstructured":"M. Mitomo and K. Kurosawa. Attack for flash mix. In ASIACRYPT\u2019 00, 2000. To appear.","DOI":"10.1007\/3-540-44448-3_15"},{"key":"30_CR31","doi-asserted-by":"crossref","unstructured":"W. Ogata, K. Kurosawa, K. Sako, and K. Takatani. Fault tolerant anonymous channel. In ICICS\u2019 97, pages 440\u2013444, 1997.","DOI":"10.1007\/BFb0028500"},{"key":"30_CR32","doi-asserted-by":"crossref","unstructured":"M. Ohkubo and M. Abe. A length-invariant hybrid mix. In ASIACRYPT\u2019 00, 2000. To appear.","DOI":"10.1007\/3-540-44448-3_14"},{"key":"30_CR33","doi-asserted-by":"crossref","unstructured":"R. Ostrovsky and V. Shoup. Private information storage. In STOC\u2019 97, pages 294\u2013303, 1997.","DOI":"10.1145\/258533.258606"},{"key":"30_CR34","doi-asserted-by":"crossref","unstructured":"T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO\u2019 91, pages 129\u2013140, 1991.","DOI":"10.1007\/3-540-46766-1_9"},{"key":"30_CR35","doi-asserted-by":"crossref","unstructured":"T. Pedersen. A threshold cryptosystem without a trusted third party. In EU-ROCRYPT\u2019 91, pages 522\u2013526, 1991.","DOI":"10.1007\/3-540-46416-6_47"},{"key":"30_CR36","doi-asserted-by":"crossref","unstructured":"A. Pfitzmann and B. Pfitzmann. How to break the direct RSA-implementation of MIXes. In EUROCRYPT\u2019 89, pages 373\u2013381, 1989.","DOI":"10.1007\/3-540-46885-4_37"},{"issue":"1","key":"30_CR37","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. K. Reiter","year":"1998","unstructured":"M. K. Reiter and A. D. Rubin. Crowds: Anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1):66\u201392, 1998.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"30_CR38","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M. K. Reiter","year":"1999","unstructured":"M. K. Reiter and A. D. Rubin. Anonymous Web transactions with Crowds. Communications of the ACM, 42(2):32\u201338, 1999.","journal-title":"Communications of the ACM"},{"key":"30_CR39","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"C.P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"30_CR40","unstructured":"B. Tedeschi. E-commerce report; Critics press legal assault on tracking of Web users. New York Times. 7 February 2000."},{"key":"30_CR41","doi-asserted-by":"crossref","unstructured":"Y. Tsiounis and M. Yung. On the security of ElGamal-based encryption. In PKC\u2019 98, pages 117\u2013134, 1998.","DOI":"10.1007\/BFb0054019"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2014 CT-RSA 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45353-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T11:40:41Z","timestamp":1737286841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45353-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540418986","9783540453536"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/3-540-45353-9_30","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}