{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:03:20Z","timestamp":1725890600722},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540706298"},{"type":"electronic","value":"9783540706304"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70630-4_12","type":"book-chapter","created":{"date-parts":[[2008,7,22]],"date-time":"2008-07-22T09:20:10Z","timestamp":1216718410000},"page":"187-201","source":"Crossref","is-referenced-by-count":5,"title":["How to Bypass Two Anonymity Revocation Schemes"],"prefix":"10.1007","author":[{"given":"George","family":"Danezis","sequence":"first","affiliation":[]},{"given":"Len","family":"Sassaman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s00145-002-0128-6","volume":"16","author":"A. Beimel","year":"2003","unstructured":"Beimel, A., Dolev, S.: Buses for anonymous message delivery. Journal of Cryptology\u00a016(1), 25\u201339 (2003)","journal-title":"Journal of Cryptology"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Ning, et al. (eds.) [27], pp. 92\u2013102","DOI":"10.1145\/1315245.1315258"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-73458-1_29","volume-title":"Information Security and Privacy","author":"S. Brands","year":"2007","unstructured":"Brands, S., Demuynck, L., De Decker, B.: A practical system for globally revoking the unlinkable pseudonyms of unknown users. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 400\u2013415. Springer, Heidelberg (2007)"},{"issue":"2","key":"12_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Commun. ACM"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology\u00a01, 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"12_CR7","first-page":"41","volume-title":"Proceedings of the IEEE Symposium on Foundations of Computer Science","author":"B. Chor","year":"1995","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the IEEE Symposium on Foundations of Computer Science, pp. 41\u201350. IEEE Computer Society Press, Los Alamitos (1995)"},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1108\/10662240310488933","volume":"13","author":"J. Claessens","year":"2003","unstructured":"Claessens, J., D\u00edaz, C., Goemans, C., Preneel, B., Vandewalle, J., Dumortier, J.: Revocable anonymous access to the Internet. Journal of Internet Research\u00a013(4), 242\u2013258 (2003)","journal-title":"Journal of Internet Research"},{"key":"12_CR9","unstructured":"Claessens, J., D\u00edaz, C., Nikova, S., De Win, B., Goemans, C., Loncke, M., Naessens, V., Seys, S., De Decker, B., Dumortier, J., Preneel, B.: Technologies for controlled anonymity. APES deliverable D10, Katholieke Universiteit Leuven (2003)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/11423409_3","volume-title":"Privacy Enhancing Technologies","author":"G. Danezis","year":"2005","unstructured":"Danezis, G.: The traffic analysis of continuous-time mixes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 35\u201350. Springer, Heidelberg (2005)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/11558859_2","volume-title":"Information Hiding","author":"G. Danezis","year":"2005","unstructured":"Danezis, G., Clulow, J.: Compulsion resistant anonymous communications. In: Barni, M., Herrera-Joancomart\u00ed, J., Katzenbeisser, S., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IH 2005. LNCS, vol.\u00a03727, pp. 11\u201325. Springer, Heidelberg (2005)"},{"key":"12_CR12","unstructured":"Danezis, G., Diaz, C.: A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research (January 2008)"},{"key":"12_CR13","first-page":"2","volume-title":"IEEE Symposium on Security and Privacy","author":"G. Danezis","year":"2003","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III anonymous remailer protocol. In: IEEE Symposium on Security and Privacy, pp. 2\u201315. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-540-30114-1_21","volume-title":"Information Hiding","author":"G. Danezis","year":"2004","unstructured":"Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 293\u2013308. Springer, Heidelberg (2004)"},{"volume-title":"Access Denied: The Practice and Policy of Global Internet Filtering","year":"2008","key":"12_CR15","unstructured":"Deibert, R.J., Palfrey, J.G., Rohozinski, R., Zittrain, J. (eds.): Access Denied: The Practice and Policy of Global Internet Filtering. MIT Press, Cambridge (2008)"},{"key":"12_CR16","volume-title":"Security, privacy and trust in modern data management","author":"C. D\u00edaz","year":"2006","unstructured":"D\u00edaz, C., Preneel, B.: Accountable anonymous communication. In: Security, privacy and trust in modern data management. Springer, Heidelberg (2006)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303\u2013320. USENIX (2004)","DOI":"10.21236\/ADA465464"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/11423409_12","volume-title":"Privacy Enhancing Technologies","author":"R. Dingledine","year":"2005","unstructured":"Dingledine, R., Shmatikov, V., Syverson, P.: Synchronous batching: From cascades to free routes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 186\u2013206. Springer, Heidelberg (2005)"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/SP.2007.23","volume-title":"IEEE Symposium on Security and Privacy","author":"I. Goldberg","year":"2007","unstructured":"Goldberg, I.: Improving the robustness of private information retrieval. In: IEEE Symposium on Security and Privacy, pp. 131\u2013148. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"12_CR20","unstructured":"Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: Boneh, D. (ed.) USENIX Security Symposium, pp. 339\u2013353 (2002)"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-540-75551-7_8","volume-title":"Privacy Enhancing Technologies","author":"P.C. Johnson","year":"2007","unstructured":"Johnson, P.C., Kapadia, A., Tsang, P.P., Smith, S.W.: Nymble: Anonymous IP-address blocking. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 113\u2013133. Springer, Heidelberg (2007)"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1029179.1029197","volume-title":"WPES","author":"S. K\u00f6psell","year":"2004","unstructured":"K\u00f6psell, S., Hillig, U.: How to achieve blocking resistance for existing systems enabling anonymous web surfing. In: Atluri, V., Syverson, P.F., di Vimercati, S.D.C. (eds.) WPES, pp. 47\u201358. ACM, New York (2004)"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/11766155_15","volume-title":"Emerging Trends in Information and Communication Security","author":"S. K\u00f6psell","year":"2006","unstructured":"K\u00f6psell, S., Wendolsky, R., Federrath, H.: Revocable anonymity. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 206\u2013220. Springer, Heidelberg (2006)"},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/11423409_2","volume-title":"Privacy Enhancing Technologies","author":"N. Mathewson","year":"2005","unstructured":"Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 17\u201334. Springer, Heidelberg (2005)"},{"key":"12_CR25","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol \u2014 Version 2. IETF Internet Draft (July 2003)"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/501983.502000","volume-title":"Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)","author":"C.A. Neff","year":"2001","unstructured":"Neff, C.A.: A verifiable secret shuffle and its application to e-voting. In: Samarati, P. (ed.) Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), November 2001, pp. 116\u2013125. ACM Press, New York (2001)"},{"key":"12_CR27","doi-asserted-by":"publisher","DOI":"10.1145\/1315245","volume-title":"Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007","author":"P. Ning","year":"2007","unstructured":"Ning, P., De Capitani di Vimercati, S., Syverson, P.F.: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM Press, New York (2007)"},{"key":"12_CR28","unstructured":"Patterson, M.L., Sassaman, L.: Subliminal channels in the private information retrieval protocols. In: Proceedings of the 28th Symposium on Information Theory in the Benelux, Enschede, NL. Werkgemeenschap voor Informatie- en Communicatietheorie (2007)"},{"issue":"2","key":"12_CR29","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Rubin, A.D.: Anonymous web transactions with crowds. Commun. ACM\u00a042(2), 32\u201338 (1999)","journal-title":"Commun. ACM"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1102199.1102201","volume-title":"WPES","author":"L. Sassaman","year":"2005","unstructured":"Sassaman, L., Cohen, B., Mathewson, N.: The Pynchon Gate: a secure method of pseudonymous mail retrieval. In: Atluri, V., De Capitani di Vimercati, S., Dingledine, R. (eds.) WPES, pp. 1\u20139. ACM Press, New York (2005)"},{"key":"12_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.F.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"key":"12_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/3-540-44702-4_6","volume-title":"Designing Privacy Enhancing Technologies","author":"P. Syverson","year":"2001","unstructured":"Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 96\u2013114. Springer, Heidelberg (2001)"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: Blacklistable anonymous credentials: blocking misbehaving users without TTPs. In: Ning, et al. (eds.) [27], pp. 72\u201381.","DOI":"10.1145\/1315245.1315256"},{"key":"12_CR34","first-page":"28","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy","author":"M. Wright","year":"2003","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 28\u201343. IEEE Computer Society Press, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70630-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:26:25Z","timestamp":1620015985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70630-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540706298","9783540706304"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70630-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}