{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:02:03Z","timestamp":1725483723481},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_17","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"230-245","source":"Crossref","is-referenced-by-count":9,"title":["Real World Patterns of Failure in Anonymity Systems"],"prefix":"10.1007","author":[{"given":"Richard","family":"Clayton","sequence":"first","affiliation":[]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[]},{"given":"Markus G.","family":"Kuhn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Comm. ACM 24(2), 84\u201388 (1981)","journal-title":"Comm. ACM"},{"key":"17_CR2","unstructured":"Goldberg, I., Shostack, A: Freedom Network 1.0. Zero-Knowledge Systems, Inc. http:\/\/www.freedom.net\/info\/freedompapers\/Freedom-Architecture.pdf (November 1999)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Onion Routing for Anonymous and Private Internet Connections. Comm. ACM 42(2) (1999)","DOI":"10.1145\/293411.293443"},{"key":"17_CR4","unstructured":"Privada Inc: How privacy is maintained http:\/\/www.privada.com\/news\/maintained.html (2000)"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M. Reiter","year":"1999","unstructured":"Reiter, M., Rubin, A.: Anonymous web transactions with crowds. Comm. ACM 42(2) 32\u201338 (1999)","journal-title":"Comm. ACM"},{"key":"17_CR6","unstructured":"Hush Communications: http:\/\/www.hushmail.com\/"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Syverson, P. F., Tsudik G., Reed M. G., Landwehr, C. E.: Towards an Analysis of Onion Routing. Security Workshop on Design Issues in Anonymity and Unobservability Berkeley, Ca. (July 2000)","DOI":"10.21236\/ADA465255"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System. IHW\u201998-Proc. of the International Information Hiding Workshop. (April 1998)","DOI":"10.1007\/3-540-49380-8_7"},{"key":"17_CR9","unstructured":"Waidner, M., Pfitzmann, B.: Unconditional Sender and Recipient Untraceability in spite of Active Attacks-Some Remarks. Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t Karlsruhe, Interner Bericht 5\/89 (March 1989)"},{"key":"17_CR10","unstructured":"Miles, G., Bowden, E. J.: Scripting Backdoor Steals Secrets. ZDNet. http:\/\/www.zdnet.com\/zdhelp\/stories\/main\/0,5594,2585941,00.html (June 12, 2000)"},{"key":"17_CR11","unstructured":"Anupam, V., Mayer, A.: Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. 9th USENIX Security Symposium (2000)"},{"key":"17_CR12","unstructured":"Hush Communications Anguilla, Inc.: http:\/\/www.hush.ai\/"},{"key":"17_CR13","unstructured":"Almgren, F., Andersson, G., Granlund, T., Ivansson, L., Ulfberg, S.: How We Cracked the Code Book Ciphers http:\/\/codebook.org\/codebook_solution.html"},{"key":"17_CR14","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: The Memorability and Security of Passwords Some Empirical Results. TR 500, University of Cambridge Computer Laboratory (September 2000)"},{"issue":"11","key":"17_CR15","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password Security: A Case History. Comm. ACM 22(11) 594\u2013597 (1979)","journal-title":"Comm. ACM"},{"key":"17_CR16","unstructured":"Sporkin, S.: McVeigh v Cohen. United States District Court for the District of Columbia, Civil Action No 98\u2013116 http:\/\/www.epic.org\/privacy\/internet\/aol\/navy_decision.html (1998)"},{"key":"17_CR17","unstructured":"Bell, B. A. (ed.): CyberSecurities Law Case Digest: Corporate Cybersmear Lawsuits, http:\/\/www.cybersecuritieslaw.com\/lawsuits\/casescorporatecybersmears.htm"},{"key":"17_CR18","unstructured":"Childnet: Chat Tips Banner. http:\/\/www.chatdanger.com\/banner\/banner.htm"},{"key":"17_CR19","unstructured":"Smith, R. M.: Problems with Web Anonymizing Services http:\/\/users.rcn.com\/rms2000\/anon\/anonprob.htm"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Fajman, R.: An Extensible Message Format for Message Disposition Notifications. Request for Comments 2298. http:\/\/www.ietf.org\/rfc\/rfc2298.txt (March 1998)","DOI":"10.17487\/rfc2298"},{"key":"17_CR21","unstructured":"Denning, D. E.: Cryptography and Data Security. Addison Wesley (1982)"},{"key":"17_CR22","unstructured":"Anderson, R.: Security Engineering-A Guide to Building Dependable Distributed Systems. John Wiley & Sons (2001) 146\u2013148"},{"key":"17_CR23","unstructured":"National Computer Security Center: A Guide to Understanding Covert Channel Analysis of Trusted Systems. NCSC-TG-030, Version 1 (November 1993)"},{"key":"17_CR24","unstructured":"Iachello, G.: Single MIX Protection Profile, Revision 1.11 http:\/\/www.iig.uni-freiburg.de\/~giac (May 1999)"},{"key":"17_CR25","unstructured":"Rao, J. R., Rohatgi, P.: Can Pseudonymity Really Guarantee Privacy? 9th USENIX Security Symposium (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:27Z","timestamp":1556376027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}