{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:49:51Z","timestamp":1760042991473},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_3","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"32-47","source":"Crossref","is-referenced-by-count":63,"title":["Modelling Unlinkability"],"prefix":"10.1007","author":[{"given":"Sandra","family":"Steinbrecher","sequence":"first","affiliation":[]},{"given":"Stefan","family":"K\u00f6psell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"The anonymizer, http:\/\/www.anonymizer.com"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web mixes: A system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"3_CR3","unstructured":"Brands, S.: An efficient off-line electronic cash system based on the representation problem. Centrum voor Wiskunde en Informatica, Computer Science\/ Department of Algorithmics and Architecture, Report CS-R9323 (March 1993)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology\u00a0(1) (1988)","DOI":"10.1007\/BF00206326"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/3-540-39805-8_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"D. Chaum","year":"1986","unstructured":"Chaum, D.: Showing credentials without identification - signatures transferred between unconditionally unlinkable pseudonyms. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 241\u2013244. Springer, Heidelberg (1986)"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-45496-9_17","volume-title":"Information Hiding","author":"R. Clayton","year":"2001","unstructured":"Clayton, R., Danezis, G., Kuhn, M.G.: Real world patterns of failure in anonymity systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 230\u2013245. Springer, Heidelberg (2001)"},{"key":"3_CR8","volume-title":"Proceedings of the 23rd Symposium on Information Theory in the Benelux","author":"C. Diaz","year":"2002","unstructured":"Diaz, C., Claessens, J., Seys, S., Preneel, B.: Information theory and anonymity. In: Proceedings of the 23rd Symposium on Information Theory in the Benelux, May 29\u201331. Louvain la Neuve, Belgium (2002)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. To appear in Journal of Computer Security (2003)","DOI":"10.3233\/JCS-2004-12102"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information Hiding","author":"D. Kesdogan","year":"1998","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-and-go-mixes providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 83\u201398. Springer, Heidelberg (1998)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"K\u00f6hntopp, M., Pfitzmann, A.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. Draft v0.12 (June 2001)","DOI":"10.1007\/3-540-44702-4_1"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J.-F. Raymond","year":"2001","unstructured":"Raymond, J.-F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 10. Springer, Heidelberg (2001)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communication, Special Issue on Copyright and Privacy Protection (1998)","DOI":"10.21236\/ADA465335"},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/3-540-61770-1_38","volume-title":"Computer Security - ESORICS 96","author":"S. Schneider","year":"1996","unstructured":"Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 198\u2013218. Springer, Heidelberg (1996)"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information-theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"3_CR18","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28\/4","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. The Bell System Technical Journal\u00a028\/4, 656\u2013715 (1949)","journal-title":"The Bell System Technical Journal"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Shmatikov, V.: Probabilistic analysis of anonymity. In: Proc. 15th IEEE Computer Security Foundations Workshop (CSFW), pp. 119\u2013128 (2002)","DOI":"10.1109\/CSFW.2002.1021811"},{"issue":"4","key":"3_CR20","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1145\/330382.330384","volume":"2","author":"S.G. Stubblebine","year":"1999","unstructured":"Stubblebine, S.G., Syverson, P.F., Goldschlag, D.M.: Unlinkable serial transactions: Protocols and applications. ACM Transactions on Information and System Security\u00a02(4), 354\u2013389 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1007\/3-540-48119-2_45","volume-title":"FM\u201999 - Formal Methods","author":"P.F. Syverson","year":"1999","unstructured":"Syverson, P.F., Stubblebine, S.G.: Group principals and the formalization of anonymity. In: Wing, J.M., Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 814\u2013833. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:37:06Z","timestamp":1559209026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}