{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:42:42Z","timestamp":1725525762501},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642004391"},{"type":"electronic","value":"9783642004407"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00440-7_15","type":"book-chapter","created":{"date-parts":[[2009,2,19]],"date-time":"2009-02-19T12:26:52Z","timestamp":1235046412000},"page":"148-157","source":"Crossref","is-referenced-by-count":3,"title":["Anonymity and Application Privacy in Context of Mobile Computing in eHealth"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Slamanig","sequence":"first","affiliation":[]},{"given":"Christian","family":"Stingl","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Menard","sequence":"additional","affiliation":[]},{"given":"Martina","family":"Heiligenbrunner","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Thierry","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Andersson, C., Lundin, R., Fischer-H\u00fcbner, S.: Privacy Enhanced WAP Browsing with mCrowds \u2013 Anonymity Properties and Performance Evaluation of the mCrowds System. In: Proceedings of the ISSA 2004 Enabling Tomorrow Conference, Gallagher Estate, Midrand, South Africa, June 30-July 2 (2004)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Andersson, C., Panchenko, A.: Practical Anonymous Communication on the Mobile Internet using Tor. In: Proceedings of the Third International Workshop on the Value of Security through Collaboration (IEEE SECOVAL 2007) part of IEEE SECURECOMM 2007, Nice, France (September 2007)","DOI":"10.1109\/SECCOM.2007.4550305"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"G. Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 255\u2013270. Springer, Heidelberg (2000)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Anonymous Authentication with Subset Queries. In: Proc. of ACM Conference on Computer and Communications Security, pp. 113\u2013119 (1999)","DOI":"10.1145\/319709.319725"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"issue":"2","key":"15_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"issue":"10","key":"15_CR7","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"15_CR8","unstructured":"Computer Crime and Security Survey 2007, Computer Security Institute, http:\/\/www.gocsi.com\/forms\/csi_survey.jhtml"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proc. of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"15_CR10","unstructured":"Danezis, G., Diaz, C.: A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research (January 2008)"},{"key":"15_CR11","unstructured":"Lindell, A.: Anonymous Authenticaion. Whitepaper Aladdin Knowledge Systems (2007), http:\/\/www.aladdin.com\/blog\/pdf\/AnonymousAuthentication.pdf"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, Unobservability, and Pseudonymity \u2013 A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"key":"15_CR13","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/978-3-642-76462-2_32","volume-title":"Proc. Kommunikation in verteilten Systemen (KiVS). IFB 267","author":"A. Pfitzmann","year":"1991","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN- Mixes: Untraceable Communication with Very Small Bandwidth Overhead. In: Proc. Kommunikation in verteilten Systemen (KiVS). IFB 267, pp. 451\u2013463. Springer, Berlin (1991)"},{"key":"15_CR14","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. Technical Report 97-15, Center for Discrete Mathematics & Theoretical Computer Science (1997)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R. Rivest","year":"2001","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013565. Springer, Heidelberg (2001)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-48390-X_14","volume-title":"Financial Cryptography","author":"S. Schechter","year":"1999","unstructured":"Schechter, S., Parnell, T., Hartemink, A.: Anonymous Authentication of Membership in Dynamic Groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, pp. 184\u2013195. Springer, Heidelberg (1999)"},{"key":"15_CR17","unstructured":"Slamanig, D., Stingl, C., Lackner, G., Payer, U.: Privacy Protection in web-based Multiuser-Systems (German). In: Horster, P. (ed.) DACH-Security 2007, pp. 98\u2013110. IT-Verlag (2007)"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/ARES.2008.115","volume-title":"Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008)","author":"D. Slamanig","year":"2008","unstructured":"Slamanig, D., Stingl, C.: Privacy Aspects of eHealth. In: Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 1226\u20131233. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-63594-7_66","volume-title":"Financial Cryptography","author":"P.F. Syverson","year":"1997","unstructured":"Syverson, P.F., Stubblebine, S.G., Goldschlag, D.M.: Unlinkable Serial Transactions. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol.\u00a01318, pp. 39\u201355. Springer, Heidelberg (1997)"},{"key":"15_CR20","unstructured":"Tatli, E.I., Stegemann, D., Lucks, S.: Dynamic Mobile Anonymity with Mixing. Technical Report TR-2006-007, Department for Mathematics and Computer Science, University of Mannheim, March 27 (2006)"}],"container-title":["Lecture Notes in Computer Science","Mobile Response"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00440-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:23:36Z","timestamp":1558153416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00440-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642004391","9783642004407"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00440-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}