{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:27:39Z","timestamp":1725564459302},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540224204"},{"type":"electronic","value":"9783540278092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27809-2_23","type":"book-chapter","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T03:28:35Z","timestamp":1283830115000},"page":"227-232","source":"Crossref","is-referenced-by-count":3,"title":["Mixminion: Strong Anonymity for Financial Cryptography"],"prefix":"10.1007","author":[{"given":"Nick","family":"Mathewson","sequence":"first","affiliation":[]},{"given":"Roger","family":"Dingledine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-45126-6_7","volume-title":"Financial Cryptography","author":"A. Acquisti","year":"2003","unstructured":"Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 84\u2013102. Springer, Heidelberg (2003), http:\/\/freehaven.net\/doc\/fc03\/econymics.pdf"},{"unstructured":"The Anonymizer, http:\/\/www.anonymizer.com\/","key":"23_CR2"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-45496-9_18","volume-title":"Information Hiding","author":"A. Back","year":"2001","unstructured":"Back, A., M\u00f6ller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 245\u2013257. Springer, Heidelberg (2001), http:\/\/www.cypherspace.org\/adam\/pubs\/traffic.pdf"},{"unstructured":"Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc. (December 2000), http:\/\/freehaven.net\/anonbib\/#freedom2-arch","key":"23_CR4"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2) (February 1981), http:\/\/www.eskimo.com\/~weidai\/mix-net.txt","key":"23_CR5","DOI":"10.1145\/358549.358563"},{"unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Type III (Mixminion) mix protocol specifications, http:\/\/mixminion.net\/minion-spec.txt","key":"23_CR6"},{"unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003), http:\/\/mixminion.net\/minion-design.pdf","key":"23_CR7"},{"doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second- Generation Onion Router (November 2003), http:\/\/freehaven.net\/tor\/tor-design.pdf","key":"23_CR8","DOI":"10.21236\/ADA465464"},{"doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: A peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC (November 2002), http:\/\/pdos.lcs.mit.edu\/tarzan\/docs\/tarzan-ccs02.pdf","key":"23_CR9","DOI":"10.1145\/586110.586137"},{"unstructured":"Helsingius, J.: anon.penet.fi press release, http:\/\/www.penet.fi\/press-english.html","key":"23_CR10"},{"unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol \u2013 Version 2. Draft (July 2003), http:\/\/www.abditum.com\/mixmaster-spec.txt","key":"23_CR11"},{"doi-asserted-by":"crossref","unstructured":"Parekh, S.: Prospects for remailers. First Monday\u00a01(2) (August 1996), http:\/\/www.firstmonday.dk\/issues\/issue2\/remailers\/","key":"23_CR12","DOI":"10.5210\/fm.v1i2.476"},{"doi-asserted-by":"crossref","unstructured":"Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA (November 2002), http:\/\/www.tik.ee.ethz.ch\/~rennhard\/publications\/morphmix.pdf","key":"23_CR13","DOI":"10.1145\/644527.644537"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27809-2_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:34Z","timestamp":1605759694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27809-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540224204","9783540278092"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27809-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}