{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:52:16Z","timestamp":1747806736551},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540755500"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75551-7_9","type":"book-chapter","created":{"date-parts":[[2007,9,28]],"date-time":"2007-09-28T10:52:49Z","timestamp":1190976769000},"page":"134-152","source":"Crossref","is-referenced-by-count":40,"title":["Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services"],"prefix":"10.1007","author":[{"given":"Lasse","family":"\u00d8verlier","sequence":"first","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"The Anonymizer. http:\/\/www.anonymizer.com\/"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"9_CR3","unstructured":"Boucher, P., Shostack, A., Goldberg, I.: Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc. (December 2000)"},{"key":"9_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pp. 46\u201366 (July 2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"9_CR6","unstructured":"Dingledine, R., Mathewson, N.: Tor protocol specification (February 2007), http:\/\/tor.eff.org\/svn\/trunk\/doc\/spec\/tor-spec.txt"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. on Information Theory"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_18","volume-title":"Privacy Enhancing Technologies","author":"I. Goldberg","year":"2006","unstructured":"Goldberg, I.: On the security of the Tor authentication protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, Springer, Heidelberg (2006)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D.M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) Information Hiding. LNCS, vol.\u00a01174, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"key":"9_CR11","unstructured":"Onion Routing: Brief\u00a0Selected History, http:\/\/www.onion-router.net\/history.html"},{"key":"9_CR12","unstructured":"IEEE. P1363 standard specifications for public-key cryptography. IEEE Std 1363-2000 (January 2000)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the Seventth Workshop on Privacy Enhancing Technologies (PET 2007) (this proceedings)","author":"A. Kate","year":"2001","unstructured":"Kate, A., Zaverucha, G., Goldberg, I.: Pairing-based onion routing. In: TSDM 2000. LNCS, Springer, Heidelberg (2001), Also University of Waterloo, Tech. Report CACR 2007-08"},{"key":"9_CR14","unstructured":"Manezes, A.J., Qu, M., Vanstone, S.A.: Some new key agreement protocols providing implicit authentication. In: Workshop in Selected Areas of Cryptography (SAC 1995), pp. 22\u201332 (1995)"},{"key":"9_CR15","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1997)"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1180405.1180410","volume-title":"CCS 2006","author":"S.J. Murdoch","year":"2006","unstructured":"Murdoch, S.J.: Hot or not: Revealing hidden services by their clock skew. In: CCS 2006. Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 27\u201336. ACM Press, New York (2006)"},{"key":"9_CR17","volume-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy","author":"L. \u00d8verlier","year":"2006","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_13","volume-title":"Privacy Enhancing Technologies","author":"L. \u00d8verlier","year":"2006","unstructured":"\u00d8verlier, L., Syverson, P.: Valet services: Improving hidden servers with a personal touch. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, Springer, Heidelberg (2006)"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/CSAC.1996.569678","volume-title":"Proceedings of the 12th Annual Computer Security Applications Conference","author":"M.G. Reed","year":"1996","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Proxies for Anonymous Routing. In: Proceedings of the 12th Annual Computer Security Applications Conference, pp. 95\u2013104. IEEE Computer Society Press, Los Alamitos (1996)"},{"issue":"4","key":"9_CR20","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M.G. Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9_CR21","unstructured":"Relakks. http:\/\/www.relakks.com\/"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75551-7_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:24:05Z","timestamp":1619519045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75551-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540755500"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75551-7_9","relation":{},"subject":[]}}