{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T18:37:08Z","timestamp":1773254228807,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540206101","type":"print"},{"value":"9783540409564","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_10","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"141-160","source":"Crossref","is-referenced-by-count":49,"title":["gap \u2013 Practical Anonymous Networking"],"prefix":"10.1007","author":[{"given":"Krista","family":"Bennett","sequence":"first","affiliation":[]},{"given":"Christian","family":"Grothoff","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-45450-0_8","volume-title":"Information Security and Privacy","author":"K. Bennett","year":"2002","unstructured":"Bennett, K., Grothoff, C., Horozov, T., Patrascu, I.: Efficient Sharing of Encrypted Data. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, p. 107. Springer, Heidelberg (2002)"},{"key":"10_CR2","unstructured":"Castro, M., Druschel, P., Hu, Y., Rowstron, A.: Exploiting network proximity in distributed hash tables. In: Proceedings of the International Workshop on Future Directions in Distributed Computing (2002)"},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptography, 65\u201375 (1988)","DOI":"10.1007\/BF00206326"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing Privacy Enhancing Technologies","author":"I. Clarke","year":"2001","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 46. Springer, Heidelberg (2001)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE Symposium on Security and Privacy (2003)","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"10_CR8","volume-title":"Proceedings of GP2PC 2003","author":"R.A. Ferreira","year":"2003","unstructured":"Ferreira, R.A., Grothoff, C., Ruth, P.: A transport layer abstraction for peer-to-peer networks. In: Proceedings of GP2PC 2003. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, D.C. (2002)","DOI":"10.1145\/586110.586137"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Grothoff, C.: An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik (June 2003)","DOI":"10.1007\/BF03254946"},{"key":"10_CR11","unstructured":"Kennell, R.: Proving the Authenticity of a Remote Microprocessor (2003)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Reed, M., Syverson, P., Goldschlag, D.: Proxies for anonymous routing. In: 12th Annual Computer Security Applications Conference, December 1995, pp. 95\u2013104 (1995)","DOI":"10.1109\/CSAC.1996.569678"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES), in association with 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, USA (November 2002)","DOI":"10.1145\/644527.644537"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, p. 329. Springer, Heidelberg (2001)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Scarlata, V., Levine, B., Shields, C.: Responder anonymity and anonymous peer-to-peer file sharing. In: Proceedings of IEEE International Conference on Network Protocols, ICNP 2001 (2001)","DOI":"10.1109\/ICNP.2001.992907"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"10_CR18","unstructured":"Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A Protocol for Scalable Anonymous Communication. In: IEEE Symposium on Security and Privacy (2002)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Shields, C., Levine, B.N.: A protocol for anonymous communication over the Internet. In: ACM Conference on Computer and Communications Security, pp. 33\u201342 (2000)","DOI":"10.1145\/352600.352607"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/383059.383071","volume-title":"Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, pp. 149\u2013160. ACM Press, New York (2001)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Syverson, P., Goldschlag, D., Reed, M.: Anonymous Connections and Onion Routing. In: IEEE Symposium on Security and Privacy, Oakland, California, 4\u20137, pp. 44\u201354 (1997)","DOI":"10.1109\/SECPRI.1997.601314"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T04:47:56Z","timestamp":1740199676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}