{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:08:11Z","timestamp":1770433691016,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540224204","type":"print"},{"value":"9783540278092","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27809-2_25","type":"book-chapter","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T03:28:35Z","timestamp":1283830115000},"page":"251-265","source":"Crossref","is-referenced-by-count":184,"title":["Timing Attacks in Low-Latency Mix Systems"],"prefix":"10.1007","author":[{"given":"Brian N.","family":"Levine","sequence":"first","affiliation":[]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-45126-6_7","volume-title":"Financial Cryptography","author":"A. Acquisti","year":"2003","unstructured":"Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 84\u2013102. Springer, Heidelberg (2003)"},{"key":"25_CR2","unstructured":"Back, A., Goldberg, I., Shostack, A.: Freedom 2.0 Security Issues and Analysis. Zero-Knowledge Systems, Inc., white paper (November 2000)"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Berthold, O., Federrath, H., Kohntopp, M.: Project anonymity and unobservability in the internet. In: Proc. Computers Freedom and Privacy (April 2000)","DOI":"10.1145\/332186.332211"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Berthold, O., Pfitzmann, A., Standtke, R.: The Disadvantages of Free Mix- Routes and How to Overcome Them. In: Proc. Intl. Workshop on Design Issues in Anonymity and Unobservability (July 2000)","DOI":"10.1007\/3-540-44702-4_3"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Bolot, J.: Characterizing End-to-End Packet Delay and Loss in the Internet. Journal of High Speed Networks\u00a02(3) (September 1993)","DOI":"10.1145\/166237.166265"},{"issue":"2","key":"25_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"25_CR7","unstructured":"Dei, W.: Pipenet 1.1 (August. 1996), http:\/\/www.eskimo.com\/weidai\/pipenet.txt"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Reliable MIX Cascade Networks through Reputation. In: Proc. Financial Cryptography (2003)","DOI":"10.1007\/3-540-36504-4_18"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J. Douceur","year":"2002","unstructured":"Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Freedman, M., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Proc. ACM Conference on Computer and Communications Security (November 2002)","DOI":"10.1145\/586110.586137"},{"key":"25_CR11","unstructured":"Gribble, S.: UC Berkeley Home IP HTTP Traces (July 1997), http:\/\/www.acm.org\/sigcomm\/ITA\/"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Jakobsson, M.: Flash mixing. In: Proc. Sym. on Principles of Distributed Computing (May 1999)","DOI":"10.1145\/301308.301333"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Egner, J., Buschkes, R.: Stop-and-go-mixes providing probablilistic anonymity in an open system. In: Proc. Information Hiding (April 1998)","DOI":"10.1007\/3-540-49380-8_7"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDNMixes: Untraceable Communication with Very Small Bandwidth Overhead. In: Proc. GI\/ITG Communication in Distributed Systems (February 1991)","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Rackoff, C., Simon, D.R.: Cryptographic defense against traffic analysis. In: Proc. ACM Sym. on the Theory of Computing (May 1993)","DOI":"10.1145\/167088.167260"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Reed, M., Syverson, P., Goldschlag, D.: Anonymous Connections and Onion Routing. IEEE JSAC Copyright and Privacy Protection (1998)","DOI":"10.21236\/ADA465335"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Krishna Gummadi, P., Gribble, S.: A Measurement Study of Peer-to- Peer File Sharing Systems. In: Proc. Multimedia Computing and Networking (January 2002)","DOI":"10.1117\/12.449977"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: active attacks on several mix types. In: Information Hiding (2002)","DOI":"10.1007\/3-540-36415-3_3"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Workshop on Design Issues in Anonymity and Unobservability (July 2000)","DOI":"10.21236\/ADA465255"},{"key":"25_CR20","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: An Analysis of the Degradation of Anonymous Protocols. In: Proc. ISOC Sym. on Network and Distributed System Security (Febraury 2002)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending Anonymous Communication Against Passive Logging Attacks. In: Proc. IEEE Sym. on Security and Privacy (May 2003)","DOI":"10.1109\/SECPRI.2003.1199325"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27809-2_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T16:07:10Z","timestamp":1740499630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27809-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540224204","9783540278092"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27809-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}