{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:36:18Z","timestamp":1762004178548,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319929248"},{"type":"electronic","value":"9783319929255"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92925-5_4","type":"book-chapter","created":{"date-parts":[[2018,6,8]],"date-time":"2018-06-08T13:48:35Z","timestamp":1528465715000},"page":"38-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Anonymity Online \u2013 Current Solutions and Challenges"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Marx","sequence":"first","affiliation":[]},{"given":"Erik","family":"Sy","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Burkert","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Federrath","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,9]]},"reference":[{"key":"4_CR1","unstructured":"European Commission: Proposal for a regulation on privacy and electronic communications. https:\/\/ec.europa.eu\/digital-single-market\/en\/proposal-eprivacy-regulation. Accessed 27 Nov 2017"},{"key":"4_CR2","unstructured":"European Court of Justice: Judgement on Case C-582\/14. http:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/PDF\/?uri=uriserv%3AOJ.C_.2016.475.01.0003.01.ENG. Accessed 27 Nov 2017"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Reid, A.S.: The European court of justice case of Breyer. J. Inf. Rights Policy Pract. 2(1) (2017)","DOI":"10.21039\/irpandp.v2i1.32"},{"key":"4_CR4","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)"},{"issue":"05","key":"4_CR5","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006), p. 24. IEEE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering (ICDE 2007), pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"4_CR9","unstructured":"Article 29 Data Protection Working Party: Opinion 05\/2014 on Anonymisation Techniques (2014)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Hsiao, H.C., Kim, T.H.J., Perrig, A., Yamada, A., Nelson, S.C., Gruteser, M., Meng, W.: LAP: lightweight anonymity and privacy. In: Security and Privacy, pp. 506\u2013520. IEEE (2012)","DOI":"10.1109\/SP.2012.37"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-39028-4_7","volume-title":"Open Problems in Network Security","author":"D Herrmann","year":"2016","unstructured":"Herrmann, D., Lindemann, J., Zimmer, E., Federrath, H.: Anonymity online for everyone: what is missing for zero-effort privacy on the internet? In: Camenisch, J., Kesdo\u011fan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 82\u201394. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39028-4_7"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Bujlow, T., Carela-Espa\u00f1ol, V., Sol\u00e9-Pareta, J., Barlet-Ros, P.: A survey on web tracking: mechanisms, implications, and defenses. Proc. IEEE (2017)","DOI":"10.1109\/JPROC.2016.2637878"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Hannak, A., Soeller, G., Lazer, D., Mislove, A., Wilson, C.: Measuring price discrimination and steering on e-commerce web sites. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 305\u2013318. ACM (2014)","DOI":"10.1145\/2663716.2663744"},{"key":"4_CR14","unstructured":"Schwartz, J.: Giving Web a Memory Cost Its Users Privacy. http:\/\/www.nytimes.com\/2001\/09\/04\/business\/giving-web-a-memory-cost-its-users-privacy.html. Accessed 27 Nov 2017"},{"key":"4_CR15","unstructured":"Perry, M.: Disable TLS session resumption and session IDs. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/4099. Accessed 27 Nov 2017"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2005.26","volume":"2","author":"T Kohno","year":"2005","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Secur. Comput. 2(2), 93\u2013108 (2005)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"4_CR17","unstructured":"Edwards, J.: Apple has quietly started tracking iPhone users again, and it\u2019s tricky to opt out. http:\/\/www.businessinsider.com\/ifa-apples-iphone-tracking-in-ios-6-2012-10. Accessed 27 Nov 2017"},{"key":"4_CR18","unstructured":"Mowery, K., Shacham, H.: Pixel perfect: fingerprinting canvas in HTML5. In: Proceedings of W2SP, pp. 1\u201312 (2012)"},{"key":"4_CR19","unstructured":"Goecks, J., Shavlik, J.: Automatically labeling web pages based on normal user actions. In: Proceedings of the IJCAI Workshop on Machine Learning for Information Filtering (1999)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48\u201356. ACM (1997)","DOI":"10.1145\/266420.266434"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Padmanabhan, B., Yang, Y.C.: Clickprints on the web: are there signatures in web browsing data? (2007)","DOI":"10.2139\/ssrn.931057"},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"116","DOI":"10.13176\/11.427","volume":"7","author":"SP Banerjee","year":"2012","unstructured":"Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116\u2013139 (2012)","journal-title":"J. Pattern Recogn. Res."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Sy, E., Mueller, T., Marx, M., Herrmann, D.: AppPETs: a framework for privacy-preserving apps. In: SAC 2018 Symposium on Applied Computing, 9\u201313 April 2018, Pau, France (2018)","DOI":"10.1145\/3167132.3167415"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Ren, J., Rao, A., Lindorfer, M., Legout, A., Choffnes, D.: Recon: Revealing and controlling PII leaks in mobile network traffic. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pp. 361\u2013374. ACM (2016)","DOI":"10.1145\/2906388.2906392"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.cose.2013.03.012","volume":"39","author":"D Herrmann","year":"2013","unstructured":"Herrmann, D., Banse, C., Federrath, H.: Behavior-based tracking: exploiting characteristic patterns in DNS traffic. Comput. Secur. 39, 17\u201333 (2013)","journal-title":"Comput. Secur."},{"key":"4_CR26","unstructured":"The Tails Project: Tails. https:\/\/tails.boum.org. Accessed 27 Nov 2017"},{"key":"4_CR27","unstructured":"The Qubes OS Project: Qubes OS. https:\/\/www.qubes-os.org. Accessed 27 Nov 2017"},{"key":"4_CR28","unstructured":"Whonix developers: Whonix OS. https:\/\/www.whonix.org. Accessed 27 Nov 2017"},{"key":"4_CR29","unstructured":"Ahmad, D.M.: Subgraph OS. https:\/\/subgraph.com. Accessed 27 Nov 2017"},{"key":"4_CR30","unstructured":"AppArmor developers: AppArmor. http:\/\/wiki.apparmor.net. Accessed 27 Nov 2017"},{"key":"4_CR31","unstructured":"Xen developers: Xen Project. https:\/\/www.xenproject.org. Accessed 27 Nov 2017"},{"key":"4_CR32","unstructured":"Open Source Security Inc: Grsecurity. https:\/\/grsecurity.net. Accessed 27 Nov 2017"},{"key":"4_CR33","unstructured":"Appelbaum, J.: Description of Tor Stream Isolation. http:\/\/archives.seul.org\/or\/dev\/Jul-2010\/msg00021.html. Accessed 27 Nov 2017"},{"issue":"2","key":"4_CR34","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"2","key":"4_CR35","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"4_CR36","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-642-76462-2_32","volume-title":"Kommunikation in verteilten Systemen","author":"Andreas Pfitzmann","year":"1991","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: untraceable communication with very small bandwidth overhead. In: Effelsberg, W., Meuer, H.W., M\u00fcller, G. (eds.) Kommunikation in verteilten Systemen. Informatik-Fachberichte, vol. 267, pp. 451\u2013463. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/978-3-642-76462-2_32"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-61996-8_36","volume-title":"Information Hiding","author":"H Federrath","year":"1996","unstructured":"Federrath, H., Jerichow, A., Pfitzmann, A.: MIXes in mobile communication systems: location management with privacy. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 121\u2013135. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61996-8_36"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information Hiding","author":"D Kesdogan","year":"1998","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-and-go-MIXes providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 83\u201398. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-49380-8_7"},{"key":"4_CR39","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"David Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Heidelberg (1983). https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18"},{"issue":"10","key":"4_CR40","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"issue":"1","key":"4_CR41","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65\u201375 (1988)","journal-title":"J. Cryptol."},{"issue":"8","key":"4_CR42","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/0167-4048(90)90114-9","volume":"9","author":"H B\u00fcrk","year":"1990","unstructured":"B\u00fcrk, H., Pfitzmann, A.: Value exchange systems enabling security and unobservability. Comput. Secur. 9(8), 715\u2013721 (1990)","journal-title":"Comput. Secur."},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Cooper, D.A., Birman, K.P.: Preserving privacy in a network of mobile computers. In: Security and Privacy, pp. 26\u201338. IEEE (1995)","DOI":"10.1109\/SECPRI.1995.398920"},{"key":"4_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"DM Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137\u2013150. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61996-8_37"},{"key":"4_CR45","unstructured":"AN.ON: Anonymit\u00e4t.Online. https:\/\/anon.inf.tu-dresden.de. Accessed 27 Nov 2017"},{"key":"4_CR46","unstructured":"JonDos GmbH: JonDonym. https:\/\/www.anonym-surfen.de. Accessed 27 Nov 2017"},{"key":"4_CR47","unstructured":"JonDos GmbH: Status der Mixkaskaden. https:\/\/www.anonym-surfen.de\/status\/. Accessed 27 Nov 2017"},{"key":"4_CR48","unstructured":"AN.ON-Next: Anonymit\u00e4t Online der n\u00e4chsten Generation. https:\/\/www.anon-next.de. Accessed 27 Nov 2017"},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Technical report, Naval Research Lab, Washington DC (2004)","DOI":"10.21236\/ADA465464"},{"key":"4_CR50","unstructured":"Tor Project: Tor Metrics. https:\/\/metrics.torproject.org. Accessed 27 Nov 2017"},{"key":"4_CR51","unstructured":"Perry, M., Clark, E., Murdoch, S., Koppen, G.: The Design and Implementation of the Tor Browser (2017). https:\/\/www.torproject.org\/projects\/torbrowser\/design\/"},{"key":"4_CR52","doi-asserted-by":"crossref","unstructured":"Narten, T., Huston, G., Roberts, L.: IPv6 Address Assignment to End Sites. Technical Report 157, RFC Editor (2011)","DOI":"10.17487\/rfc6177"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. The Smart Revolution"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92925-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T01:35:01Z","timestamp":1751679301000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92925-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319929248","9783319929255"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92925-5_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ispra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/ifip-summerschool2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}