{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:49:49Z","timestamp":1755838189886,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229872"},{"type":"electronic","value":"9783540301080"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30108-0_9","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T14:15:03Z","timestamp":1284646503000},"page":"141-159","source":"Crossref","is-referenced-by-count":24,"title":["Comparison Between Two Practical Mix Designs"],"prefix":"10.1007","author":[{"given":"Claudia","family":"D\u00edaz","sequence":"first","affiliation":[]},{"given":"Len","family":"Sassaman","sequence":"additional","affiliation":[]},{"given":"Evelyne","family":"Dewitte","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Ben-Halim, Z., Raymond, E., Pfeifer, J., Dickey, T.: Ncurses"},{"key":"9_CR2","unstructured":"Cox, M., Engelschall, R., Henson, S., Laurie, B.: The OpenSSL Project"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"4","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"9_CR4","unstructured":"Microsoft Corporation. Visual basic language reference\u2013Rnd function. MSDN Library"},{"key":"9_CR5","unstructured":"Cottrell, L.: Mixmaster and remailer attacks"},{"key":"9_CR6","unstructured":"Cottrell, L.: Announcement: Mixmaster 2.0 remailer release! Usenet post (May 1995)"},{"key":"9_CR7","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Deutsch, P., Gailly, J.-L.: ZLIB Compressed Data Format Specification version 3.3. Request for Comments: 1950 (May 1996)","DOI":"10.17487\/rfc1950"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-30114-1_22","volume-title":"Information Hiding","author":"C. Diaz","year":"2004","unstructured":"Diaz, C., Preneel, B.: Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 309\u2013325. Springer, Heidelberg (2004)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Danezis, G., Sassaman, L.: Heartbeat traffic to counter (n-1) attacks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003), Washington, DC, USA (October 2003)","DOI":"10.1145\/1005140.1005154"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks in several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-40956-4_2","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Serjantov, A.: Generalising mixes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 18\u201331. Springer, Heidelberg (2003)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"9_CR14","unstructured":"Goldberg, I., Wagner, D.: Randomness and the Netscape browser. Dr. Dobb\u2019s Journal (January 1996)"},{"key":"9_CR15","unstructured":"Hazel, P.: Perl compatible regular expressions"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information Hiding","author":"D. Kesdogan","year":"1998","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, p. 83. Springer, Heidelberg (1998)"},{"key":"9_CR17","unstructured":"U lf M\u00f6ller. Personal communication. Private email to Len Sassaman (August 2002)"},{"key":"9_CR18","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol \u2013 Version 2 (July 2004), \n                  \n                    http:\/\/www.abditum.com\/mixmaster-spec.txt"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability and pseudonymity \u2013 a proposal for terminology. In: Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, July 2000, pp. 1\u20139 (2000)","DOI":"10.1007\/3-540-44702-4_1"},{"key":"9_CR20","unstructured":"RProcess. Selective denial of service attacks. Usenet post (September 1999)"},{"key":"9_CR21","unstructured":"Sassaman, L.: The promise of privacy. In: LISA XVI (November 2002) (invited talk)"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"9_CR23","unstructured":"Thayer, R.: SlimJim: shared library shimming for password harvesting. Presentation, ToorCon (September 2003)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Thompson, K.: Reflections on trusting trust. Communications of the ACM\u00a027(8) (August 1984)","DOI":"10.1145\/358198.358210"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30108-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:35:26Z","timestamp":1559507726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30108-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229872","9783540301080"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30108-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}