{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:16:41Z","timestamp":1725520601006},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540893752"},{"type":"electronic","value":"9783540893769"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89376-9_23","type":"book-chapter","created":{"date-parts":[[2008,11,4]],"date-time":"2008-11-04T10:31:40Z","timestamp":1225794700000},"page":"232-243","source":"Crossref","is-referenced-by-count":0,"title":["An HMM Approach to Anonymity Analysis of Continuous Mixes"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Ling","sequence":"first","affiliation":[]},{"given":"Junzhou","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_2","volume-title":"Privacy Enhancing Technologies","author":"C. D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Serjantov, A.: Generalising mixes. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760. Springer, Heidelberg (2003)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36415-3_3","volume-title":"Information Hiding","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.F.: From a Trickle to a Flood: Active Attacks on Several Mix Types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 36\u201352. Springer, Heidelberg (2003)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information Hiding","author":"D. Kesdogan","year":"1998","unstructured":"Kesdogan, D., Egner, J., B\u00fcschkes, R.: Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, Springer, Heidelberg (1998)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_25","volume-title":"Financial Cryptography","author":"B.N. Levine","year":"2004","unstructured":"Levine, B.N., Reiter, M.K., Wang, C., et al.: Timing Attacks in Low-Latency Mix Systems. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110. Springer, Heidelberg (2004)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11863908_2","volume-title":"Computer Security \u2013 ESORICS 2006","author":"V. Shmatikov","year":"2006","unstructured":"Shmatikov, V., Wang, M.H.: Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 18\u201333. Springer, Heidelberg (2006)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Kesdogan, D., Penz, S.: Probabilistic treatment of MIXes to hamper traffic analysis. In: Proceedings of Symposium on Security and Privacy 2003, pp. 16\u201327 (2003)","DOI":"10.1109\/SECPRI.2003.1199324"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Danezis, G., Diaz, C., Troncoso, C.: Two-sided Statistical Disclosure Attack. Privacy Enhancing Technologies, 30\u201344 (2007)","DOI":"10.1007\/978-3-540-75551-7_3"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Yu, W., Fu, X., Graham, S., et al.: DSSS-Based Flow Marking Technique for Invisible Traceback. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 18\u201332 (2007)","DOI":"10.1109\/SP.2007.14"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Danezis, G.: The Traffic Analysis of Continuous-Time Mixes. Privacy Enhancing Technologies, 35\u201350 (2005)","DOI":"10.1007\/11423409_3"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-30108-0_9","volume-title":"Computer Security \u2013 ESORICS 2004","author":"C. D\u00edaz","year":"2004","unstructured":"D\u00edaz, C., Sassaman, L., Dewitte, E.: Comparison Between Two Practical Mix Designs. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 141\u2013159. Springer, Heidelberg (2004)"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-75551-7_2","volume-title":"Privacy Enhancing Technologies","author":"A. Serjantov","year":"2007","unstructured":"Serjantov, A.: A Fresh Look at the Generalised Mix Framework. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, p. 17. Springer, Heidelberg (2007)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Danezis, G.: Towards an Information Theoretic Metric for Anonymity. Privacy Enhancing Technologies, 259\u2013263 (2003)","DOI":"10.1007\/3-540-36467-6_4"},{"issue":"2","key":"23_CR14","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TSP.2005.861066","volume":"54","author":"P. Salvo Rossi","year":"2006","unstructured":"Salvo Rossi, P., Romano, G., Palmieri, F., Iannello, G.: Joint end-to-end loss-delay hidden Markov model for periodic UDP traffic over the Internet. IEEE Transactions on Signal Processing\u00a054(2), 530\u2013541 (2006)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"16","key":"23_CR15","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1016\/j.comcom.2005.02.012","volume":"28","author":"L. Muscariello","year":"2005","unstructured":"Muscariello, L., Mellia, M., Meo, M., et al.: Markov models of internet traffic and a new hierarchical MMPP model. Computer Communications\u00a028(16), 1835\u20131851 (2005)","journal-title":"Computer Communications"},{"key":"23_CR16","unstructured":"Bilmes, J.A.: A Gentle Tutorial of the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and Hidden Markov Models. International Computer Science Institute\u00a04 (1998)"},{"issue":"5","key":"23_CR17","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1109\/TIT.1982.1056544","volume":"28","author":"L. Liporace","year":"1982","unstructured":"Liporace, L.: Maximum likelihood estimation for multivariate observations of Markov sources. IEEE Transactions on Information Theory\u00a028(5), 729\u2013734 (1982)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden Markov models and selected applications inspeech recognition[J]. Proceedings of the IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"23_CR19","doi-asserted-by":"publisher","first-page":"545","DOI":"10.2307\/2532308","volume":"48","author":"B.G. Leroux","year":"1992","unstructured":"Leroux, B.G., Puterman, M.L.: Maximum-penalized-likelihood estimation for independent and Markov-dependent mixture models. Biometrics\u00a048(2), 545\u2013558 (1992)","journal-title":"Biometrics"}],"container-title":["Lecture Notes in Computer Science","Advanced Web and Network Technologies, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89376-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T02:27:42Z","timestamp":1557887262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89376-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893752","9783540893769"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89376-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}