{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:10:34Z","timestamp":1771265434576,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540206101","type":"print"},{"value":"9783540409564","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_1","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"1-17","source":"Crossref","is-referenced-by-count":48,"title":["Mix-Networks with Restricted Routes"],"prefix":"10.1007","author":[{"given":"George","family":"Danezis","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-44702-4_3","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 30\u201345. Springer, Heidelberg (2001)"},{"key":"1_CR3","unstructured":"Boucher, P., Goldberg, I., Shostack, A.: Freedom system 2.0 architecture. Zero-Knowledge Sytems, Inc. (December 2000), http:\/\/www.freedom.net\/info\/whitepapers\/"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a04(2) (February 1981)","DOI":"10.1145\/358549.358563"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Danezis, G.: Statistical disclosure attacks. In: Sec 2003 (May 2003), http:\/\/www.cl.cam.ac.uk\/~gd216\/StatDisclosure.pdf","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Security and Privacy Symposium (2003)","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Privacy Enhancing Technologies Workshop 2002 (April 2002)","DOI":"10.1007\/3-540-36467-6_5"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-45496-9_10","volume-title":"Information Hiding","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A reputation system to increase MIX-net reliability. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 126\u2013141. Springer, Heidelberg (2001)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Syverson, P.: Reliable MIX Cascade Networks through Reputation. In: Proceedings of Financial Cryptography (2002)","DOI":"10.1007\/3-540-36504-4_18"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Gillman, D.: A chernoff bound for random walks on expander graphs. In: IEEE Symposium on Foundations of Computer Science, pp. 680\u2013691 (1993)","DOI":"10.1109\/SFCS.1993.366819"},{"key":"1_CR11","unstructured":"Glasner, Y.: Ramanujan graphs with small girth"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private internet connections. Communications of the ACM (USA)\u00a042(2), 39\u201341 (1999)","journal-title":"Communications of the ACM (USA)"},{"key":"1_CR13","volume-title":"Network and Distributed Security Symposium - NDSS 1996","author":"C. Gulcu","year":"1996","unstructured":"Gulcu, C., Tsudik, G.: Mixing E-mail with Babel. In: Network and Distributed Security Symposium - NDSS 1996. IEEE, Los Alamitos (1996)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Jerichow, A., M\u00fcller, J., Pfitzmann, A., Pfitzmann, B., Waidner, M.: Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol. IEEE Journal on Selected Areas in Communications (1998)","DOI":"10.1109\/49.668973"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-36415-3_4","volume-title":"Information Hiding","author":"D. Kesdogan","year":"2003","unstructured":"Kesdogan, D., Agrawal, D., Penz, S.: Limits of anonymity in open environments. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 53\u201369. Springer, Heidelberg (2003)"},{"key":"1_CR16","unstructured":"Linial, N., Wigderson, A.: Expander graphs and their applications. Collection of Lecture Notes (January 2003), http:\/\/www.math.ias.edu\/~avi\/TALKS\/expander_course.pdf"},{"key":"1_CR17","unstructured":"Mock, C.: Mixmaster stats (Austria), http:\/\/www.tahina.priv.at\/~cm\/stats\/mlist2.html"},{"key":"1_CR18","unstructured":"M\u00f6ller, U., Cottrell, L.: Mixmaster Protocol\u2013Version 2. Unfinished draft (January 2000), http:\/\/www.eskimo.com\/~rowdenw\/crypt\/Mix\/draft-moellermixmaster2-protocol-00.txt"},{"key":"1_CR19","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"R. Motwani","year":"1995","unstructured":"Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge Univerisity Press, New York (1995)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: Isdnmixes: Untraceable communication with very small bandwidth overhead (1991)","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudonymity - A proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"key":"1_CR22","unstructured":"Pinsker, M.S.: On the complexity of a concentrator. In: Proceedings of the 7th International Teletraffic Conference, Stockholm, pp. 318\/1\u2013318\/4 (1973)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Reingold, O., Vadhan, S.P., Wigderson, A.: Entropy waves, the zigzag graph product, and new constant-degree expanders and extractors. In: IEEE Symposium on Foundations of Computer Science, pp. 3\u201313 (2000)","DOI":"10.1109\/SFCS.2000.892006"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretc metric for anonymity. In: Privacy Enhancing Technologies Workshop 2002, San Francisco, CA (May 2002)","DOI":"10.1007\/3-540-36467-6_4"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"issue":"3","key":"1_CR26","doi-asserted-by":"crossref","first-page":"237","DOI":"10.3233\/JCS-1997-5305","volume":"5","author":"P. Syverson","year":"1997","unstructured":"Syverson, P., Reed, M., Goldschlag, D.: Private web browsing. Journal of Computer Security\u00a05(3), 237\u2013248 (1997)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T04:47:57Z","timestamp":1740199677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}