{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:05:02Z","timestamp":1743077102440,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":16,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461482666"},{"type":"electronic","value":"9781461482659"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4614-8265-9_271","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T12:14:31Z","timestamp":1544098471000},"page":"2812-2818","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Enhancing Technologies"],"prefix":"10.1007","author":[{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"2","key":"271_CR16443","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum DL. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM. 1981;24(2):84\u20138.","journal-title":"Commun ACM"},{"key":"271_CR16444","first-page":"262","volume":"10","author":"DL Chaum","year":"1987","unstructured":"Chaum DL. Security without identification: card computers to make big brother obsolete. Informatik-Spektrum. 1987;10:262\u201377.","journal-title":"Informatik-Spektrum"},{"issue":"1","key":"271_CR16445","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"DL Chaum","year":"1988","unstructured":"Chaum DL. The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol. 1988;1(1):65\u201375.","journal-title":"J Cryptol"},{"key":"271_CR16446","unstructured":"Registratiekamer, Information and Privacy Commissioner\/Ontario. Privacy-enhancing technologies: the path to anonymity. Achtergrondstudies en Verkenningen 5B, vols. I and II, Rijswijk. 1995."},{"key":"271_CR16447","doi-asserted-by":"crossref","unstructured":"Brands S. Rethinking public key infrastructure and digital certificates \u2013 building in privacy. PhD thesis. Eindhoven: Institute of Technology; 1999.","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"271_CR16448","doi-asserted-by":"crossref","unstructured":"Camenisch J, Fischer-H\u00fcbner S, & Rannenberg K (Eds.). Privacy and identity management for life. Springer Science & Business Media; 2011.","DOI":"10.1007\/978-3-642-20317-6"},{"key":"271_CR16449","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium; 2004.","DOI":"10.21236\/ADA465464"},{"issue":"4","key":"271_CR16450","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"MG Reed","year":"1998","unstructured":"Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE J Select Areas Commn. 1998;16(4):482\u201394.","journal-title":"IEEE J Select Areas Commn"},{"issue":"2","key":"271_CR16451","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M Reiter","year":"1999","unstructured":"Reiter M, Rubin A. Anonymous web transactions with crowds. Commun ACM. 1999;42(2):32\u201348.","journal-title":"Commun ACM"},{"key":"271_CR16452","volume-title":"Web privacy with P3P","author":"L Cranor","year":"2002","unstructured":"Cranor L. Web privacy with P3P. Sebastopol: O\u2019Reilly; 2002."},{"key":"271_CR16453","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Differential privacy. Automata, languages and programming","author":"C Dwork","year":"2006","unstructured":"Dwork C. Differential privacy. Automata, languages and programming. Berlin\/Heidelberg: Springer; 2006. p. 1\u201312."},{"key":"271_CR16454","series-title":"LNCS","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45150-1","volume-title":"IT-security and privacy: design and use of privacy enhancing security mechanisms","author":"S Fischer-H\u00fcbner","year":"2001","unstructured":"Fischer-H\u00fcbner S. IT-security and privacy: design and use of privacy enhancing security mechanisms, LNCS, vol. 1958. Berlin: Springer LNCS; 2001. ISBN:3-540-42142-4."},{"key":"271_CR16455","unstructured":"PrimeLife. Privacy and identity management in Europe for life \u2013 policy languages. http:\/\/primelife.ercim.eu\/results\/primer\/133-policy-languages Accessed 11 Aug 2014."},{"key":"271_CR16456","unstructured":"Cooper DA, Birman KP. Preserving privacy in a network of mobile computers. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy; 1995. p. 26\u201383."},{"key":"271_CR16457","doi-asserted-by":"crossref","unstructured":"Camenisch J, van Herreweghen E. Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security; 2002. p. 21\u201330.","DOI":"10.1145\/586110.586114"},{"key":"271_CR16458","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G\u00fcnter Karjoth","year":"2003","unstructured":"Karjoth G, Schunter M, Waidner M. Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Proceedings of the 2nd Workshop on Privacy Enhancing Technologies; 2002. p. 69\u201384."}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-8265-9_271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:06:36Z","timestamp":1591049196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-8265-9_271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781461482666","9781461482659"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-8265-9_271","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}