{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:17Z","timestamp":1725557897297},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_6","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"81-87","source":"Crossref","is-referenced-by-count":1,"title":["Improving Onion Notation"],"prefix":"10.1007","author":[{"given":"Richard","family":"Clayton","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"6_CR2","volume-title":"HCI Models, Theories, and Frameworks: Towards a Multidisciplinary Science","author":"A. Blackwell","year":"2003","unstructured":"Blackwell, A., Green, T.: Notational Systems - the Cognitive Dimensions of Notations framework. In: Carroll, J.M. (ed.) HCI Models, Theories, and Frameworks: Towards a Multidisciplinary Science. Morgan Kaufmann Publishers, San Francisco (2003)"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Trans. on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. on Computer Systems"},{"key":"6_CR4","unstructured":"Cajori, F.: A history of mathematical notations. The Open Court Publishing Company, Chicago Il. 1928\u20139"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Comm. ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Comm. ACM"},{"key":"6_CR6","unstructured":"Frege, G.: Begriffsschrift. Eine der arithmetischen nachgebildeten Formelsprache des reinen Denkens. Halle (1879)"},{"key":"6_CR7","unstructured":"Gerhardt, C.I.: Briefwechsel von G.W.Liebniz mit Mathematikern, Vol I. quoted in para. #540 of [4]"},{"key":"6_CR8","unstructured":"Goldberg, I., Shostack, A.: Freedom Network 1.0 Architecture, October 10 (2001), \n                  \n                    http:\/\/www.homeport.org\/~adam\/zeroknowledgewhitepapers\/archnotech.pdf"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D.M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"key":"6_CR10","unstructured":"Mendelsohn, R.: Begriffsschrift in Modern Notation, \n                  \n                    http:\/\/comet.lehman.cuny.edu\/mendel\/papers\/Adobe%20Versions\/AdobeNewBGForms.pdf"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/3-540-44448-3_14","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Ohkubo","year":"2000","unstructured":"Ohkubo, M., Abe, M.: A Length-Invariant Hybrid Mix. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 178\u2013191. Springer, Heidelberg (2000)"},{"issue":"2","key":"6_CR12","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/0167-4048(87)90087-3","volume":"6","author":"A. Pfitzmann","year":"1987","unstructured":"Pfitzmann, A., Waidner, M.: Networks without User Observability. Computer Security\u00a06(2), 158\u2013166 (1987)","journal-title":"Computer Security"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-45748-8_11","volume-title":"Peer-to-Peer Systems","author":"A. Serjantov","year":"2002","unstructured":"Serjantov, A.: Anonymizing censorship Resistant Systems. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 111\u2013120. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:12:10Z","timestamp":1552612330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}