{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:13Z","timestamp":1725557893270},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_11","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T15:02:02Z","timestamp":1277218922000},"page":"161-176","source":"Crossref","is-referenced-by-count":10,"title":["An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks"],"prefix":"10.1007","author":[{"given":"Dennis","family":"K\u00fcgler","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Anderson, R.J.: The eternity service. In: Proceedings of Pragocrypt 1996 (1996)"},{"key":"11_CR2","volume-title":"Designing Privacy Enhancing Technologies \u2013 International Workshop on Design Issues in Anonymity and Unobservability 2003","author":"K. Bennett","year":"2003","unstructured":"Bennett, K., Grothoff, C.: GAP \u2013 practical anonymous networking. In: Designing Privacy Enhancing Technologies \u2013 International Workshop on Design Issues in Anonymity and Unobservability 2003. Springer, Heidelberg (2003)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-45450-0_8","volume-title":"Information Security and Privacy","author":"K. Bennett","year":"2002","unstructured":"Bennett, K., Grothoff, C., Horozov, T., Patrascu, I.: Efficient sharing of encrypted data. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 107\u2013120. Springer, Heidelberg (2002)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-44702-4_3","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 30\u201345. Springer, Heidelberg (2001)"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return adresses and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Clarke, I., Miller, S.G., Hong, T.W.: Oskar Sandberg, and Brandon Wiley. Protecting free expression online with Freenet. IEEE Internet Computing, 40\u201349 (2002)","DOI":"10.1109\/4236.978368"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-44702-4_4","volume-title":"Designing Privacy Enhancing Technologies","author":"I. Clarke","year":"2001","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 46\u201366. Springer, Heidelberg (2001)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-44702-4_5","volume-title":"Designing Privacy Enhancing Technologies","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: Distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 67\u201395. Springer, Heidelberg (2001)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Frankel, J., Pepper, T.: Gnutella v. 0.56. Nullsoft (2000)","DOI":"10.1016\/S0090-4295(00)00566-5"},{"key":"11_CR10","unstructured":"Grothoff, C., Patrascu, I., Bennett, K., Stef, T., Horozov, T.: GNET. Whitepaper version 0.5.2 (2002)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Grothoff, C.: An excess-based economic model for resource allocation in peer-to-peer networks. Wirtschaftsinformatik\u00a0(3) (2003)","DOI":"10.1007\/BF03254946"},{"key":"11_CR12","unstructured":"Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Proceedings of the 7th USENIX Security Symposium (1998)"},{"key":"11_CR13","unstructured":"Rubin Marc Waldman, A.D., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In: Proc. 9th USENIX Security Symposium, pp. 59\u201372 (2000)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudonymity \u2013 a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-45748-8_11","volume-title":"Peer-to-Peer Systems","author":"A. Serjantov","year":"2002","unstructured":"Serjantov, A.: Anonymizing censorship resistant systems. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 111\u2013120. Springer, Heidelberg (2002)"},{"key":"11_CR17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/CSFW.2002.1021811","volume-title":"15th IEEE Computer Security Foundations Workshop","author":"V. Shmatikov","year":"2002","unstructured":"Shmatikov, V.: Probabilistic analysis of anonymity. In: 15th IEEE Computer Security Foundations Workshop, pp. 119\u2013128. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"11_CR18","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Network and Distributed System Security Symposium \u2013 NDSS 2002, Internet Society (2002)"},{"key":"11_CR19","first-page":"126","volume-title":"ACM Conference on Computer and Communications Security","author":"M. Waldman","year":"2001","unstructured":"Waldman, M., Mazi\u00e8res, D.D.: Tangler: A censorship-resistant publishing system based on document entanglements. In: ACM Conference on Computer and Communications Security, pp. 126\u2013135. ACM Press, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T05:37:08Z","timestamp":1559194628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}