{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:36:40Z","timestamp":1761676600629,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319756493"},{"type":"electronic","value":"9783319756509"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75650-9_20","type":"book-chapter","created":{"date-parts":[[2018,2,16]],"date-time":"2018-02-16T15:14:32Z","timestamp":1518794072000},"page":"303-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Weighted Factors for Evaluating Anonymity"],"prefix":"10.1007","author":[{"given":"Khalid","family":"Shahbar","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,17]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Dhiah el Diehn, A.-T., Pimenidis, L., Schomburg, J., Westermann, B.: Usability inspection of anonymity networks. In: 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, CONGRESS 2009, pp. 100\u2013109. IEEE (2009)","DOI":"10.1109\/CONGRESS.2009.38"},{"issue":"1","key":"20_CR2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. cryptol. 1(1), 65\u201375 (1988)","journal-title":"J. cryptol."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Clark, J., Van Oorschot, P.C., Adams, C.: Usability of anonymous web browsing: an examination of Tor interfaces and deployability. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 41\u201351. ACM (2007)","DOI":"10.1145\/1280680.1280687"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 54\u201368. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36467-6_5"},{"key":"20_CR5","unstructured":"Garlic routing (2014). https:\/\/geti2p.net\/en\/docs\/how\/garlic-routing"},{"key":"20_CR6","unstructured":"I2P\u2019s threat model: Harvesting attacks (2010). https:\/\/geti2p.net\/en\/docs\/how\/threat-model"},{"key":"20_CR7","unstructured":"HTTPS-everywhere extension. https:\/\/www.eff.org\/https-everywhere"},{"key":"20_CR8","unstructured":"Anonymous surfing with JonDoFox (n.d.). https:\/\/anonymous-proxy-servers.net\/en\/jondofox.html"},{"key":"20_CR9","unstructured":"Jondonym InfoService (n.d.). https:\/\/anonymous-proxy-servers.net\/en\/help\/infoservice.html"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-70630-4_5","volume-title":"Privacy Enhancing Technologies","author":"D McCoy","year":"2008","unstructured":"McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: understanding the Tor network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63\u201376. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70630-4_5"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-54568-9_1","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"SJ Murdoch","year":"2014","unstructured":"Murdoch, S.J.: Quantifying and measuring anonymity. In: Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S., Fitzgerald, W.M. (eds.) DPM\/SETOP -2013. LNCS, vol. 8247, pp. 3\u201313. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54568-9_1"},{"key":"20_CR13","unstructured":"Ries, T., Panchenko, A., Engel, T., et al.: Comparison of low-latency anonymous communication systems: practical usage and performance. In: Proceedings of the Ninth Australasian Information Security Conference, vol. 116, pp. 77\u201386. Australian Computer Society, Inc. (2011)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 41\u201353. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36467-6_4"},{"key":"20_CR15","unstructured":"The design and implementation of the Tor browser (2017). https:\/\/www.torproject.org\/projects\/torbrowser\/design\/#idm29"},{"key":"20_CR16","unstructured":"Tor Obfs3 (n.d.). https:\/\/gitweb.torproject.org\/pluggable-transports\/obfsproxy.git\/tree\/doc\/obfs3\/obfs3-protocol-spec.txt"},{"key":"20_CR17","unstructured":"Tor pluggable transports (n.d.). https:\/\/www.torproject.org\/docs\/pluggable-transports.html.en"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-540-75551-7_15","volume-title":"Privacy Enhancing Technologies","author":"R Wendolsky","year":"2007","unstructured":"Wendolsky, R., Herrmann, D., Federrath, H.: Performance comparison of low-latency anonymisation services from a user perspective. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 233\u2013253. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75551-7_15"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Winter, P., Pulls, T., Fuss, J.: ScrambleSuit: a polymorphic network protocol to circumvent censorship. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 213\u2013224. ACM (2013)","DOI":"10.1145\/2517840.2517856"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75650-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T21:55:10Z","timestamp":1751406910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75650-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756493","9783319756509"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75650-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}