{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:43:32Z","timestamp":1746297812272},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_2","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"18-31","source":"Crossref","is-referenced-by-count":46,"title":["Generalising Mixes"],"prefix":"10.1007","author":[{"given":"Claudia","family":"D\u00edaz","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Serjantov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"unstructured":"Cottrell, L.: Mixmaster and remailer attacks (1994), \n                  \n                    http:\/\/www.obscura.com\/~loki\/remailer\/remailer-essay.html","key":"2_CR2"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003), \n                  \n                    http:\/\/petworkshop.org\/2002\/program.html"},{"key":"2_CR4","volume-title":"An introduction to probability theory and its applications","author":"W. Feller","year":"1950","unstructured":"Feller, W.: An introduction to probability theory and its applications. Wiley, Chichester (1950)"},{"unstructured":"Jerichow, A.: Generalisation and Security Improvement of Mix-mediated Anonymous Communication. PhD thesis, Technischen Universitat Dresden (2000)","key":"2_CR5"},{"doi-asserted-by":"crossref","unstructured":"Kesdogan, D., Egner, J., Buschkes, R.: Stop-and-go-MIXes providing probabilistic anonymity in an open system. In: Proceedings of the International Information Hiding Workshop (April 1998)","key":"2_CR6","DOI":"10.1007\/3-540-49380-8_7"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003), \n                  \n                    http:\/\/petworkshop.org\/2002\/program.html"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Serjantov, A., Newman, R.E.: On the anonymity of timed pool mixes. In: Workshop on Privacy and Anonymity in Networked and Distributed Systems (18th IFIP International Information Security Conference), Athens, Greece (May 2003)","key":"2_CR9","DOI":"10.1007\/978-0-387-35691-4_41"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:46:28Z","timestamp":1552614388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}