{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:23:11Z","timestamp":1742401391646},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_4","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"48-65","source":"Crossref","is-referenced-by-count":14,"title":["Metrics for Traffic Analysis Prevention"],"prefix":"10.1007","author":[{"given":"Richard E.","family":"Newman","sequence":"first","affiliation":[]},{"given":"Ira S.","family":"Moskowitz","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Serjantov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-45496-9_18","volume-title":"Information Hiding","author":"A. Back","year":"2001","unstructured":"Back, A., M\u00f6ller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 245\u2013257. Springer, Heidelberg (2001)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-36467-6_9","volume-title":"Privacy Enhancing Technologies","author":"O. Berthold","year":"2003","unstructured":"Berthold, O., Langos, H.: Dummy traffic against long term intersection attacks. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 110\u2013128. Springer, Heidelberg (2003)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 54\u201368. Springer, Heidelberg (2003)"},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/90.532860","volume":"4","author":"L. Georgiadis","year":"1996","unstructured":"Georgiadis, L., Gu\u00e9rin, R., Peris, V., Sivarajan, K.N.: Efficient network QoS provisioning based on per node traffic shaping. IEEE\/ACM Transactions on Networking\u00a04(4), 482\u2013501 (1996)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D. Goldschlag","year":"1996","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"key":"4_CR6","volume-title":"Data Communications, Computer Networks, and Open Systems","author":"F. Halsall","year":"1992","unstructured":"Halsall, F.: Data Communications, Computer Networks, and Open Systems. Addison-Wesley, Reading (1992)"},{"issue":"5","key":"4_CR7","first-page":"328","volume":"22","author":"M.H. Kang","year":"1998","unstructured":"Kang, M.H., Moskowitz, I.S., Lee, D.C.: A network Pump. IEEE Transactions on Software Engineering\u00a022(5), 328\u2013329 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/CSAC.1991.213014","volume-title":"Proc. IEEE\/ACM Seventh Annual Computer Security Applications Conference","author":"R.E. Newman-Wolfe","year":"1991","unstructured":"Newman-Wolfe, R.E., Venkatraman, B.R.: High level prevention of traffic analysis. In: Proc. IEEE\/ACM Seventh Annual Computer Security Applications Conference, San Antonio, TX, Dec 2-6, pp. 102\u2013109. IEEE CS Press, Los Alamitos (1991)"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/CSAC.1992.228227","volume-title":"Proc. IEEE\/ACM Eighth Annual Computer Security Applications Conference","author":"R.E. Newman-Wolfe","year":"1992","unstructured":"Newman-Wolfe, R.E., Venkatraman, B.R.: Performance analysis of a method for high level prevention of traffic analysis. In: Proc. IEEE\/ACM Eighth Annual Computer Security Applications Conference, San Antonio, TX, Nov 30-Dec 4, pp. 123\u2013130. IEEE CS Press, Los Alamitos (1992)"},{"unstructured":"Onion routing home page, \n                  \n                    http:\/\/www.onion-router.net","key":"4_CR10"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability and pseudonymity \u2014 a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Rackoff, C., Simon, D.R.: Cryptographic defense against traffic analysis. In: ACM Symposium on Theory of Computing, pp. 672\u2013681 (1993)","key":"4_CR12","DOI":"10.1145\/167088.167260"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J. Raymond","year":"2001","unstructured":"Raymond, J.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 10\u201329. Springer, Heidelberg (2001)"},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 41\u201353. Springer, Heidelberg (2003)"},{"key":"4_CR16","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell System Technical Journal"},{"key":"4_CR17","volume-title":"Data and Computer Communications","author":"W. Stallings","year":"2000","unstructured":"Stallings, W.: Data and Computer Communications, 6th edn. Prentice-Hall, Englewood Cliffs (2000)","edition":"6"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1007\/3-540-48119-2_45","volume-title":"FM\u201999 - Formal Methods","author":"P. Syverson","year":"1999","unstructured":"Syverson, P., Stubblebine, S.: Group principals and the formalization of anonymity. In: Wing, J.M., Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 814\u2013833. Springer, Heidelberg (1999)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/3-540-44702-4_6","volume-title":"Designing Privacy Enhancing Technologies","author":"P.F. Syverson","year":"2001","unstructured":"Syverson, P.F., Tsudik, G., Reed, M.G., Landwehr, C.E.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 96\u2013114. Springer, Heidelberg (2001)"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/CSAC.1994.367298","volume-title":"Proc. IEEE\/ACM Tenth Annual Computer Security Applications Conference","author":"B.R. Venkatraman","year":"1994","unstructured":"Venkatraman, B.R., Newman-Wolfe, R.E.: Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. In: Proc. IEEE\/ACM Tenth Annual Computer Security Applications Conference, Orlando, FL, December 5-9, pp. 288\u2013297. IEEE CS Press, Los Alamitos (1994)"},{"key":"4_CR21","first-page":"186","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"B.R. Venkatraman","year":"1995","unstructured":"Venkatraman, B.R., Newman-Wolfe, R.E.: Capacity estimation and auditability of network covert channels. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 8-10, pp. 186\u2013198. IEEE CS Press, Los Alamitos (1995)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:41:33Z","timestamp":1552610493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}