{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:27:32Z","timestamp":1746199652674},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441793"},{"type":"electronic","value":"9783540457480"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45748-8_13","type":"book-chapter","created":{"date-parts":[[2007,10,9]],"date-time":"2007-10-09T12:29:16Z","timestamp":1191932956000},"page":"130-140","source":"Crossref","is-referenced-by-count":24,"title":["Mnemosyne: Peer-to-Peer Steganographic Storage"],"prefix":"10.1007","author":[{"given":"Steven","family":"Hand","sequence":"first","affiliation":[]},{"given":"Timothy","family":"Roscoe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"13_CR1","unstructured":"Ross Anderson. The Eternity Service. In Proceedings of the 1st International Conference on the Theory and Applications of Cryptology (PRAGOCRYPT\u201996). CTU Publishing House, Prague, 1996."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Ross Anderson, Roger Needham, and Adi Shamir. The Steganographic File System. In IWIH: International Workshop on Information Hiding, 1998.","DOI":"10.1007\/3-540-49380-8_6"},{"key":"13_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/BFb0052229","volume-title":"Deniable encryption","author":"R. Canetti","year":"1997","unstructured":"R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable encryption. Lecture Notes in Computer Science, 1294:90\u2013104, 1997."},{"issue":"2","key":"13_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84\u201388, February 1981.","journal-title":"Communications of the ACM"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. Private Information Retrieval. In IEEE Symposium on Foundations of Computer Science, pages 41\u201350, 1995.","DOI":"10.1109\/SFCS.1995.492461"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46\u201366, July 2000.","DOI":"10.1007\/3-540-44702-4_4"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"F. Dabek, M. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage withCFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP\u2019 01), Banff, Canada., October 2001.","DOI":"10.1145\/502034.502054"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Roger Dingledine, Michael J. Freedman, and David Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Unobservability, pages 67\u201395, July 2000.","DOI":"10.1007\/3-540-44702-4_5"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Peter Druschel and Antony Rowstron. PAST: A large-scale, persistent peer-to-peer storage utility. In Proceedings of the Eighth Workshop on Hot Topics in Operating Systems (HotOS-VIII). Schloss Elmau, Germany, May 2001.","DOI":"10.1109\/HOTOS.2001.990064"},{"key":"13_CR10","unstructured":"A. Iyengar, Robert Cahn, Juan A Garay, and Charanjit Jutla. Design and implementation of a secure distributed data repository. In Proceedings of the 14th IFIP International Information Security Conference (SEC 98), New York, 1998., 1998."},{"key":"13_CR11","unstructured":"Charanjit S. Jutla. Encryption modes with almost free message integrity. Cryptology Print Archive, Report 2000\/039, 2000. http:\/\/eprint.iacr.org\/ ."},{"key":"13_CR12","unstructured":"John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao. OceanStore: An Architecture for Global-Scale Persistent Storage. In Proceedings of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), November 2000."},{"key":"13_CR13","series-title":"Lect Notes Comput Sci","first-page":"462","volume-title":"Information Hiding","author":"A. D. McDonald","year":"1999","unstructured":"Andrew D. McDonald and Markus G. Kuhn. StegFS: A Steganographic File System for Linux. In Information Hiding, number 1768 in LNCS, pages 462\u2013477. Springer Verlag, 1999."},{"issue":"2","key":"13_CR14","first-page":"335","volume":"36","author":"M. Rabin","year":"1989","unstructured":"M. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Communications of the ACM, 36(2):335\u2013348, April 1989.","journal-title":"Communications of the ACM"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"S Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addressable Network. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.","DOI":"10.1145\/383059.383072"},{"issue":"1","key":"13_CR16","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. K. Reiter","year":"1998","unstructured":"Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1):66\u201392, 1998.","journal-title":"ACM Transactions on Information and System Security"},{"key":"13_CR17","first-page":"12","volume":"4","author":"R. L. Rivest","year":"1998","unstructured":"Ronald L. Rivest. Chaffing and winnowing: Confidentiality without encryption. In CryptoBytes (RSA Laboratories), Vol 4 No 1, pages 12\u201317, 1998.","journal-title":"CryptoBytes (RSA Laboratories)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz. OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In Eighth ACM Conference on Computer and Communications Security (CCS-8). ACM Press, August 2001.","DOI":"10.1145\/501983.502011"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 18th IFIP\/ACM Internation Conference on Distributed Systems Platforms (Middleware 2001), Heidelberg, Germany, November 2001.","DOI":"10.1007\/3-540-45518-3_18"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM 2001, San Diego, California, USA., August 2001.","DOI":"10.1145\/383059.383071"},{"key":"13_CR21","unstructured":"Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proceeding of the 9th USENIX Security Symposium, pages 59\u201372, August 2000."},{"key":"13_CR22","unstructured":"Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. Technical Report UCB\/\/CSD-01-1141, U. C. Berkeley, April 2000."}],"container-title":["Lecture Notes in Computer Science","Peer-to-Peer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45748-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T16:50:10Z","timestamp":1556902210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45748-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441793","9783540457480"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45748-8_13","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}