{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T05:40:51Z","timestamp":1737006051469,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_16","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"215-229","source":"Crossref","is-referenced-by-count":1,"title":["The Strong Eternity Service"],"prefix":"10.1007","author":[{"given":"Tonda","family":"Bene\u0161","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"16_CR1","unstructured":"Ross J. Anderson. The eternity service. In Pragocrypt 1996, 1996. http:\/\/www.cl.cam.ac.uk\/rja\/eternity.html ."},{"key":"16_CR2","unstructured":"A. Back. The eternity service. Phrack Magazine, 7(51), Sep 1997. http:\/\/www.cypherspace.org\/~adam\/eternity\/phrack.html ."},{"key":"16_CR3","unstructured":"I. Brown. Eternity service design. http:\/\/www.cypherspace.org\/eternity-design.html ."},{"issue":"2","key":"16_CR4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84\u201388, Feb 1981.","journal-title":"Communications of the ACM"},{"key":"16_CR5","unstructured":"Wei Dai. PipeNet 1.1. http:\/\/www.eskimo.com\/~weidai\/pipenet.txt ."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"D. M. Goldschlag, G. R. Michael, and P. F. Syverson. Hiding routing information. In Workshop on Information Hiding, Cambridge, UK, May 1996.","DOI":"10.1007\/3-540-61996-8_37"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"D. Mills. Simple network time protocol (SNTP) version 4 for IPv4, IPv6 and OSI. Technical Report RFC-867, University of Delaware, Network Working Group, Oct 1996.","DOI":"10.17487\/rfc2030"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"David L. Mills. Network time protocol (version 3) specification, implementation and analysis. Technical Report RFC 1305, University of Delaware, Mar 1992.","DOI":"10.17487\/rfc1305"},{"key":"16_CR9","unstructured":"Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 1998."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In 18th Annual Symposium on Security and Privacy, pages 44\u201354. IEEE CS Press, May 1997.","DOI":"10.1109\/SECPRI.1997.601314"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T02:14:45Z","timestamp":1736993685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}