{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:54:40Z","timestamp":1771520080552,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540619963","type":"print"},{"value":"9783540495895","type":"electronic"}],"license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61996-8_37","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T22:30:08Z","timestamp":1330295408000},"page":"137-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":235,"title":["Hiding Routing information"],"prefix":"10.1007","author":[{"given":"David M.","family":"Goldschlag","sequence":"first","affiliation":[]},{"given":"Michael G.","family":"Reed","sequence":"additional","affiliation":[]},{"given":"Paul F.","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"issue":"n.2","key":"11_CR1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, v. 24, n. 2, Feb. 1981, pages 84\u201388.","journal-title":"Communications of the ACM"},{"key":"11_CR2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1\/1","author":"D. Chaum","year":"1988","unstructured":"D. Chaum, The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, Journal of Cryptology, 1\/1, 1988, pages 65\u201375.","journal-title":"Journal of Cryptology"},{"key":"11_CR3","unstructured":"S. Chuang. Security Management of ATM Networks, Ph.D. thesis, in progress, Cambridge University."},{"key":"11_CR4","volume-title":"Internetworking with TCP\/IP, Volume 1: Principles, Protocols, and Architecture","author":"D. E. Comer","year":"1995","unstructured":"D. E. Comer. Internetworking with TCP\/IP, Volume 1: Principles, Protocols, and Architecture, Prentice-Hall, Engelwood Cliffs, New Jersey, 1995."},{"key":"11_CR5","unstructured":"L. Cottrell. Mixmaster and Remailer Attacks, http:\/\/obscura.obscura.com\/\u223cloki\/remailer\/remailer-essay.html"},{"key":"11_CR6","unstructured":"C. Gulcu and G. Tsudik. Mixing Email with Babel, 1996 Symposium on Network and Distributed System Security, San Diego, February 1996."},{"key":"11_CR7","first-page":"373","volume-title":"How to Break the Direct RSA-implementation of MIXes","author":"A. Pfitzmann","year":"1990","unstructured":"A. Pfitzmann and B. Pfitzmann. How to Break the Direct RSA-implementation of MIXes, Advances in Cryptology-EUROCRYPT '89 Proceedings, Springer-Verlag, Berlin, 1990, pages 373\u2013381."},{"key":"11_CR8","first-page":"451","volume-title":"Informatik-Fachberichte 267","author":"A. Pfitzmann","year":"1991","unstructured":"A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead, GI\/ITG Conference: Communication in Distributed Systems, Mannheim Feb, 1991, Informatik-Fachberichte 267, Springer-Verlag, Heildelberg 1991, pages 451\u2013463."},{"key":"11_CR9","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/0167-4048(87)90087-3","volume":"6\/2","author":"A. Pfitzmann","year":"1987","unstructured":"A. Pfitzmann and M. Waidner. Networks Without User Observability, Computers & Security, 6\/2 1987, pages 158\u2013166.","journal-title":"Computers & Security"},{"key":"11_CR10","unstructured":"B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, John Wiley and Sons, 1994."},{"key":"11_CR11","volume-title":"TCP\/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols","author":"W. R. Stevens","year":"1996","unstructured":"W. R. Stevens. TCP\/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the UNIX Domain Protocols, Addison-Wesley, Reading, Mass., 1996."},{"key":"11_CR12","volume-title":"How to Set up and Maintain a World Wide Web Site: The Guide for Information Providers","author":"L. D. Stein","year":"1995","unstructured":"L. D. Stein. How to Set up and Maintain a World Wide Web Site: The Guide for Information Providers, Addison-Wesley, Reading, Mass., 1995."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61996-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T07:16:23Z","timestamp":1593760583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61996-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540619963","9783540495895"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-61996-8_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1996]]},"assertion":[{"value":"9 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}